Kaspersky Industrial CyberSecurity for Networks

Selecting sets of Intrusion Detection rules

March 22, 2024

ID 211052

In the table of Intrusion Detection rule sets, you can select the relevant sets of rules to perform actions with them.

To select the relevant sets of Intrusion Detection rules, perform one of the following actions:

  • If you want to select one set of rules, select the check box next to that rule set or use your mouse to select the rule set.
  • If you want to select multiple sets of rules, select the check boxes next to the relevant rule sets or select them while holding down the CTRL or SHIFT key.
  • If you want to select all rule sets that satisfy the current filter and search settings, perform one of the following actions:
    • Select any rule set in the table and press the key combination CTRL+A.
    • Select the check box in the title of the left-most column of the table.

The title of the left-most column of the table shows the rule set selection check box. Depending on the number of selected rule sets, the check box can have one of the following states:

  • icon_empty_flag – all rule sets that satisfy the current filter and search settings were not selected in the table. However, one rule set or multiple rule sets may be selected in the table by using the check boxes next to the rule sets or by using the CTRL or SHIFT key.
  • icon_checked_flag – all rule sets that satisfy the current filter and search settings were selected in the table.
  • icon_empty_flag – all rule sets that satisfy the current filter and search settings were selected in the table, but then the check boxes for some of the rule sets were cleared. This state is also retained if the check boxes were cleared for all rule sets selected in this way (due to the fact that the number of selected rule sets may change).

If all rule sets that satisfy the filter and search settings are selected, the number of selected rule sets may be automatically changed. For example, the available rule sets in the table may be changed by an application user in a different connection session.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.