To fully use this screen, you must add the following permission to your account:
- Read IDS
You can use the Intrusion Detection System screen to view data from the host-based intrusion detection system (HIDS).
Intrusion Detection Systems (IDS) analyze network or host traffic and alert if that traffic matches signatures of known attacks. These events are correlated in our Security Information Event Management (SIEM) system, in combination with other security data, to alert on security threats.
This system provides an agent-based, intrusion detection service for network traffic analysis and reporting. Specifically, HIDS monitors for attack attempts.
HIDS policies focus on detecting OWASP top 10 events. Any observed attempts are delivered to Armor's advanced correlation engine for inspection and correlation with other collected logs.
This widget displays the top 10 IDS events detected over the past 7 days, grouped together by signature.
|Top VMs||This widget displays the top 10 IDS events detected over the past 7 days, grouped together by virtual machine.|
Understand Intrusion Detection System (IDS)
This section displays details for all IDS events detected over the past 7 days.
|Name||This column displays the name of your virtual machine.|
|Source IP||This column displays the IP address of the signature.|
|Source Port||This column displays the port address of the signature.|
|Destination IP||This column displays the IP address of your virtual machine.|
|Destination Port||This column displays the port address of your virtual machine.|
|Event Signature||This column displays the the content of the signature.|
|Event Timestamp||This column displays the time and date when the event signature was detected.|
|Count||This column displays the number of event signatures that were detected.|
Enable Trend Sub-Agent
As a prerequisite to installing Intrusion Prevention Services, you must install the Trend sub-agent. Use the following commands to manage the Trend sub-agent.
One of the features available in Agent 3.0 is Recommendation scans. Recommendation scans provide a good starting point for establishing a list of rules that you should implement. During a recommendation scan, the Armor Agent scans the operating system for installed applications, the Windows registry, open ports, and more. To take advantage of Recommendation scans, turn on Ongoing Recommendation scans in the Toolbox.
Recommendation Scans work in tandem with the Auto-Apply configuration for IPS. The results of the Recommendation Scan can only be applied when Auto-Apply for the IPS service is turned on.
Install Trend Sub-Agent:
Uninstall Trend Sub-Agent:
Trend Sub-Agent Status:
Turn On Recommended Scans:
Turn Off Recommended Scans:
Schedule a Recommended Scan (Runs on Next Trend Sub-Agent Heartbeat):
Set Recommendation Scan Interval:
Options are "24 Hours" "2 Days" "3 Days" "7 Days" "2 Weeks" "3 Weeks" "4 Weeks"
Get Recommendation Scan Interval:
Trend Sub-Agent Help
Enable Intrusion Prevention Service
Use the following commands to manage the Intrusion Detection service.
Turn On Detect Mode:
The Auto-Apply configuration for IPS works in tandem with Recommendation Scans. Only after a Recommendation Scan is run will there be policies to Auto-Apply.
Turn On Prevent Mode:
Turn Off Prevent Mode:
List of Available IPS Rules:
List of Assigned IPS Rules on Policy:
Assign IPS Rules:
Un-Assign IPS Rule:
Intrusion Detection Help
Export IDS Data
- In the Armor Management Portal (AMP), in the left-side navigation, click Security.
- Click Intrusion Detection.
- (Optional) Use the filter function to customize the data displayed.
- Below the table, click CSV.
- You have the option to export all of the data (All), or only the data that appears on the current screen (Current Set).
Log Search for Intrusion Detection
Users can search for HIDS events in Log Search. For instructions on how to access and use Log Search, please see our documentation here.
An example of HIDS logs can be seen below:
For a full list of Log Search fields and descriptions, please visit our glossary here.
Was this helpful?