Most signatures in Snort rely solely on the contents/structure of a seen packet's application-layer data to generate an alert, so client OS type isn't going to dictate whether or not it's alerted. If you're seeing this on MacOS, and on an unrelated browser, you can likely just write it off.
This alert is based on a snort IPS rule that matches a vulnerability in a browser engine that is used in multiple products. Could be a false positive, but probably better to let it enabled if no user complains.
Most signatures in Snort rely solely on the contents/structure of a seen packet's application-layer data to generate an alert, so client OS type isn't going to dictate whether or not it's alerted. If you're seeing this on MacOS, and on an unrelated browser, you can likely just write it off.
Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community! To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.