The Intrusion Prevention Rule Properties screen displays detailed
                  information about a specific Intrusion Prevention Rule and vulnerability. Click the
                  General tab or the Vulnerability to view
                  details about the rule.
The following tables describe the information provided on the
                  General tab and Vulnerability tab.
General Information
| Data | Description | ||
| Identifier | The unique identifier tag for the Intrusion Prevention
                                 Rule | ||
| Name | The name of the Intrusion Prevention Rule | ||
| Description | The description of the Intrusion Prevention Rule 
 | ||
| Application Type | The Application Type this Intrusion Prevention Rule is
                                 grouped under | ||
| Priority | The priority level of the Intrusion Prevention Rule. Higher priority rules are
                                 applied before lower priority rules. | ||
| Severity | The severity level that Trend Micro assigns to the
                                 rule 
 | ||
| Mode | The network engine detection mode used by the Intrusion Prevention
                                 module. Click a mode to configure the setting for the rule. | ||
| Type | The type of vulnerability detected: 
 | ||
| Issued | The date the rule was released (not downloaded) | ||
| Last Updated | The date and time the rule was last modified | 
Vulnerability Information
| Data | Description | 
| Severity | The severity level of the vulnerability | 
| CVSS Score | The Common Vulnerability Scoring System (CVSS)
                                 severity score of the vulnerability according the National Vulnerability
                                 Database For more information, see http://nvd.nist.gov/cvss.cfm. | 
| Description | The description of the vulnerability | 
| External References | Provides links to external references for more information about the
                                 vulnerability | 
 
		
