About intrusion detection system policies

The Intrusion System’s default policies deploy Intrusion Detection immediately to identify threats on your network. Any custom policies you create are deployed in the same method.

The Intrusion Detection System is based on Snort Open Source software. It uses rules supplied by Smoothwall from https://rules.emergingthreats.net/.

You can use rulesets supplied by www.snort.org by applying an Oinkcode, see the help topic, Managing custom intrusion signatures.

Things you can do here

Deploying intrusion detection policies

Page reference details

IDS

Something not right? .