You can load sets of Intrusion Detection rules from files into the application. Files containing descriptions of Intrusion Detection rules must be in the same folder and have the RULES extension. The names of the files must not contain the following characters: \ / : * ? , " < > |
.
After loading Intrusion Detection rules from a file, the rules are saved in the application as a custom set of rules. The name of the set of rules will match the name of the file without the RULES extension.
When sets of rules are loaded from files, the current custom sets of rules are deleted from the table and replaced with the new ones. However, system sets of rules (whose Origin column shows the System value) are not deleted from the table.
Only users with the Administrator role can load custom sets of Intrusion Detection rules.
To load and replace custom sets of Intrusion Detection rules:
The Folder containing files with Intrusion Detection rules window opens.
The table containing sets of rules displays the new custom sets of rules. For these sets of rules, the Origin column will show the User value. All sets of rules will be in active state.