Kaspersky Anti Targeted Attack (KATA) Platform

Importing a user-defined IDS rule

8 November 2023

ID 247711

You can import a Snort or Suricata file and use it to scan events and create Intrusion Detection System alerts.

It is highly recommended that you test custom IDS rules in a test environment before you import them. Custom IDS rules may cause performance issues, in which case stable performance of Kaspersky Anti Targeted Attack Platform is not guaranteed

For example, loading user-defined rules can cause the following errors:

  • The application may create too many IDS alerts.
  • If the application cannot record all IDS alerts in time, some network traffic objects may remain unscanned.
  • Regular expressions in user-defined rules may impact performance or cause faulty operation of the application.
  • Even formally correct user-defined rules may impact performance or cause faulty operation of the application.

IDs and attributes of custom rules may be modified when they are uploaded. Reject and Drop actions are changed to Alert. Rules with the Pass action are deleted

To import a custom IDS rule:

  1. In the window of the application web interface, select the Custom rules section, IDS subsection.

    This opens the user-defined IDS rule window.

  2. Click Import.

    This opens the file selection window on your local computer.

  3. Select the file that you want to upload and click Open.

The user-defined IDS rule is imported into the application.

See also

Managing user-defined IDS rules

Viewing the information of a user-defined IDS rule

Enabling and disabling the use of an IDS rule when scanning events

Configuring the importance of alerts generated by the user-defined IDS rule

Replacing a user-defined IDS rule

Exporting a user-defined IDS rule file to the computer

Deleting a user-defined IDS rule

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.