Rule Engine
IPSFlexible IPS rule engine with wildcard pattern matching. Define rules to detect and respond to suspicious activity in real-time.
Overview
Rules are evaluated against incoming events from the kernel driver. When an event matches a rule, the configured action is taken. Rules are synced to the kernel driver for high-performance matching.
Rule Components
Match Criteria
- • Process name
- • File path
- • IP address
- • Port number
- • DNS domain
- • Protocol
- • Registry key
Actions
- • Log — Record the event
- • Alert — Show notification
- • Block — Prevent the action
- • Kill — Terminate the process
Example Rules
Block PowerShell from Temp
Process: powershell.exe | Path: *\Temp\* | Action: Block
Alert on Suspicious DNS
DNS: *.ru | Action: Alert
Log Registry Autorun
Registry: *\Run\* | Action: Log
Rule Order
Rules are evaluated in order. The first matching rule's action is taken. Place more specific rules before general ones.
Features
Default Rules
DioIPS includes default rules for common autorun protection:
- • Registry Run/RunOnce key modifications
- • Startup folder file creation
- • Scheduled task creation
- • Service installation