Fortinet white logo
Fortinet white logo
7.4.2

IPS use cases

IPS use cases

You must implement the intrusion prevention system (IPS) in the traffic flow so that it can prevent suspicious packets from reaching their destination. If you use an intrusion detection system, there is more flexibility in the location, since the IPS can receive a copy of the traffic for the primary purpose of analysis and reporting.

Note

When implementing IPS profiles, Fortinet recommends to tune the sensor to reflect the environment it protects. This involves selecting only signatures that match the services and devices it is meant to protect and adjusting thresholds for selected anomalies to suit your environment.

IPS use case

Deploy IPS...

Perimeter protection

At the network edge to provide protection against external attacks.

Datacenter protection

Within a datacenter to protect critical servers and applications against internal and external attacks.

Internet network protection

Within an internal network to provide protection against lateral movement by attackers to prevent spread of malicious activity.

Cloud protection

Within cloud environments, such as public or private cloud environments, to provide protection against cloud-based threats, including account takeover and data breaches.

For a deeper understanding of IPS use cases, see the IPS Architecture Guide.

IPS use cases

IPS use cases

You must implement the intrusion prevention system (IPS) in the traffic flow so that it can prevent suspicious packets from reaching their destination. If you use an intrusion detection system, there is more flexibility in the location, since the IPS can receive a copy of the traffic for the primary purpose of analysis and reporting.

Note

When implementing IPS profiles, Fortinet recommends to tune the sensor to reflect the environment it protects. This involves selecting only signatures that match the services and devices it is meant to protect and adjusting thresholds for selected anomalies to suit your environment.

IPS use case

Deploy IPS...

Perimeter protection

At the network edge to provide protection against external attacks.

Datacenter protection

Within a datacenter to protect critical servers and applications against internal and external attacks.

Internet network protection

Within an internal network to provide protection against lateral movement by attackers to prevent spread of malicious activity.

Cloud protection

Within cloud environments, such as public or private cloud environments, to provide protection against cloud-based threats, including account takeover and data breaches.

For a deeper understanding of IPS use cases, see the IPS Architecture Guide.