News
Abstract
The intrusion detection and prevention system (IDS) notifies you of attempts to hack into, disrupt, or deny service to the system. IDS also monitors for potential extrusions, where your system might be used as the source of the attack.
Content
IDS (Intrusion Detection System) is available in the New Navigator with the following HTTP Group PTF(s).
IBM i 7.3, HTTP SF99722 level 41
IBM i 7.4, HTTP SF99662 level 22
IBM i 7.5, HTTP SF99952 level 4
IBM i 7.4, HTTP SF99662 level 22
IBM i 7.5, HTTP SF99952 level 4
===============================================================================
You are in: IBM i Technology Updates > Navigator for i > Documentation on Functional Areas > Intrusion Detection System
See also: IBM Documentation on Intrusion detection
Prerequisite: You must have *ALLOBJ and *IOSYSCFG authority to work with intrusion detection.

Start with the Security icon, select Intrusion Detection
Sections of this page:
- Start or stop IDS
- Manage Intrusion Detection System setup
- Manage Intrusion Detection policies
- Display Intrusion Detection events
IDS does not need to be started to display existing policies or the intrusion events, but IDS must be started to pick up the new policies and to monitor the system for new intrusions and extrusions.
Start IDS
To start IDS in IBM Navigator for i, perform these steps:
- Expand Security > Intrusion Detection.
- Click Manage Intrusion Detection to display the Intrusion Detection System Setup page.
- Click Start on the Intrusion Detection System Setup page.
- Click OK to save the status change.
Stop IDS
To stop IDS in IBM Navigator for i, perform these steps:
- Expand Security > Intrusion Detection.
- Click Manage Intrusion Detection to display the Intrusion Detection System Setup page.
- Click Stop on the Intrusion Detection System Setup page.
- Click OK to save the status change.
Manage Intrusion Detection System setup
You can create a set of default intrusion detection policies that will monitor for all types of intrusions or extrusions for the entire system. You can also create specific attack, scan, and traffic regulation policies
Creating a set of default intrusion detection policies
Create a set of default intrusion detection policies that you can use to monitor for all intrusions and extrusions across all IP addresses and ports on your system.
The default intrusion detection policies include attack, scan, and traffic regulation policies.
To create a set of default intrusion detection policies, perform these steps:
In IBM Navigator for i, expand Security > Intrusion Detection.
- Click Manage policies.
- In the Intrusion Detection Policies page, select New from the Actions menu. The New intrusion detection policy wizard is displayed.
- In the Select Policy to Create page, select Create a set of default intrusion detection policies. (If the default policies already exist, an error message is displayed when trying to create them again.)
- Follow the instructions in the wizard to create the policies.
- Click OK on the Create Default Policies page to create the default policies.
Now your system is ready to catch suspicious events coming in through the TCP/IP network.
Manage Intrusion Detection policies
You can create, enable, disable, delete, or change a policy; or create a policy based on another policy.
From the Intrusion Detection Policies page, you can perform any of the following actions:
- All types of intrusion detection policies are displayed by default.
- You can further tailor the list of policies viewed by sorting and filtering the policies in the table.
- To create an intrusion detection policy, select New from the Actions menu.
- To create an intrusion detection policy based on another policy, select the policy and then select New Based On from the Actions menu.
- To disable an intrusion detection policy, select the policy and then select Disable from the Actions menu.
- To enable an intrusion detection policy, select the policy and then select Enable from the Actions menu.
- To delete an intrusion detection policy, select the policy and then select Delete from the Actions menu.
- To display the properties of an intrusion detection policy, select the policy and then select Properties from the Actions menu.
Create an attack policy
Create a scan policy
Create a traffic regulation policy
Create a policy based on another policy
Create a policy based on another in IBM Navigator for i
Change
Delete
Enable
Disable
Back up the intrusion detection policy file
Write intrusion detection programs
Display Intrusion Detection events
Use the Intrusion Detection System GUI to display a list of potential intrusion events as well as detailed information about each event.
To display intrusion detection events, perform these steps:
- In IBM Navigator for i, expand Security > Intrusion Detection.
- Click Display Events to display the Intrusion Detection Events page.
- By default, the Intrusion Detection Events page lists events that have occurred in the previous 24 hours. Perform any of the following tasks:
- To refresh the intrusion detection events immediately, select Refresh from the Actions menu.
- To display event details, select the event and select Details from the Actions menu. You also can find these event details in the intrusion monitor audit record.
- To filter intrusion events, select Include from the Actions menu. For example, you can display all of the IDS events that have occurred on the system for a specific range, or include only the events that have occurred in the past five hours.
Filtering intrusion detection events
Intrusion monitor audit record entries
[{"Type":"MASTER","Line of Business":{"code":"LOB57","label":"Power"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"ARM Category":[{"code":"a8m0z0000000CH1AAM","label":"IBM Navigator for i"}],"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.3.0;7.4.0;7.5.0;and future releases"}]
Was this topic helpful?
Document Information
Modified date:
23 December 2022
UID
ibm16825067