The Intrusion System’s default policies deploy Intrusion Detection immediately to identify threats on your network. Any custom policies you create are deployed in the same method.
The Intrusion Detection System is based on Snort Open Source software. It uses rules supplied by Smoothwall from https://rules.emergingthreats.net/.
You can use rulesets supplied by www.snort.org by applying an Oinkcode, see the help topic, Managing custom intrusion signatures.
Something not right? Send us feedback.