External alerts for intrusion events
External alerting for intrusion events provides critical-system monitoring by sending alerts based on the configured intrusion policies and rule settings. It supports sending external alerts using multiple external notification methods and operates independently of alert responses.
External alerting methods
-
Simple Network Management Protocol (SNMP): Configured per intrusion policy and sent from managed devices. SNMP alerting can be enabled for individual intrusion rules.
-
Syslog: Configured per intrusion policy and sent from managed devices. Enabling syslog alerting in an intrusion policy activates it for every rule in the policy.
-
Email: Configured across all intrusion policies and sent from the Cloud-Delivered Firewall Management Center. You can enable email alerts per intrusion rule, as well as limit their length and frequency.
If you configure intrusion event suppression or thresholding, the system may not generate an intrusion event each time a rule triggers and you might receive fewer alerts.
![]() Note |
The Cloud-Delivered Firewall Management Center also uses SNMP, email, webhook, and syslog alert responses to send different types of external alerts. For more information, refer to Configuring external alerts with alert responses. The system does not use alert responses to send alerts based on individual intrusion events. |

Feedback