IDS rules

In some situations the Intrusion Detection Service (IDS) may detect communication between routers or other internal networking devices as a potential attack. For example, you can add the known safe address to the Addresses excluded from IDS zone to bypass the IDS.


The following ESET Knowledgebase articles may only be available in English:

Create IDS rules on client workstations in ESET Endpoint Security (8.x)

Create IDS rules for client workstations in ESET PROTECT (8.x)


Detection – Type of detection.

Application – Select the file path of an excepted application by clicking ... (for example C:\Program Files\Firefox\Firefox.exe). Do NOT enter the name of the application.

Remote IP – A list of remote IPv4 or IPv6 address / ranges / subnets. Multiple addresses must be separated by a comma.

Block – Each system process has its own default behavior and assigned action (block or allow). To override the default behavior for ESET Endpoint Security you can choose to block or allow it using the drop-down menu.

Notify – Select Yes to display Desktop notifications on your computer. Select No if you do not want desktop notifications. The available values are Default/Yes/No.

Log – Select Yes to log events to ESET Endpoint Security log files. Select No if you do not want to log events. The available values are Default/Yes/No.


Tab Exclusions will be displayed if an administrator creates IDS exclusions in ESET PROTECT Web Console. IDS exclusions can contain allowing rules only and are evaluated before IDS rules.

Managing IDS rules

Add – Click to create a new IDS rule.

Edit – Click to edit an existing IDS rule.

Delete – Select and click if you want to remove an existing exception from the list of IDS rule.

UP_DOWN Top/Up/Down/Bottom – Allows you to adjust the priority level of rules (exceptions are evaluated from top to bottom).



You want to display a notification and collect a log each time the event occurs:

1.Click Add to add a new IDS rule.

2.Select particular alert from the Detection drop-down menu.

3.Click ... and select the file path of the application to which you want to apply the notification.

4.Leave Default in the Block drop-down menu. This will inherit the default action applied by ESET Endpoint Security.

5.Set both the Notify and Log drop-down menus to Yes.

6.Click OK to save this notification.


You want to remove recurring notifications for a type of detection you do not consider to be a threat:

1.Click Add to add a new IDS exception.

2.Select particular alert from the Detection drop-down menu, for example SMB session without security extensions or TCP Port Scanning attack.

3.Select In from the direction drop-down menu in case it is from an inbound communication.

4.Set the Notify drop-down menu to No.

5.Set the Log drop-down menu to Yes.

6.Leave Application blank.

7.If the communication is not coming from a particular IP address, leave Remote IP addresses blank.

8.Click OK to save this notification.