Airlock Anomaly Shield configuration
The Airlock Anomaly Shield machine learning service can be fully configured via the Configuration Center UI.
This chapter will give a step-by-step introduction to manually configuring all aspects of the Anomaly Shield.
To get started with Anomaly Shield, see Airlock Anomaly Shield Quick Start. It provides a simple, fast, and user-friendly setup process.
Chapter-related prerequisites
- You must be logged in as an admin in the Airlock Gateway Configuration Center.
Schematics of the Airlock Anomaly Shield UI
The following graphic will help you understand the configuration context and the relationships between configuration elements. The link list below allows direct navigation within this online help based on the graphic.
Step # | GUI description | Configuration instructions |
|---|---|---|
1. Application (configured) in Airlock Anomaly Shield | ||
2. Training data settings | ||
3. Mapping configuration |
| |
4. Traffic exclusion for training data collection | ||
5. Anomaly detection/response settings | ||
6. Response rule exception(s) | ||
7. Response rule(s) | ||
8. Trigger, pattern and rule configuration |
Chapter content
Further information and links
- For a general introduction, see: Airlock Anomaly Shield
- For a brief example of setup, usage and operation, see: Logs, tuning and advanced configuration
- To get started with Anomaly Shield, see Airlock Anomaly Shield Quick Start.
