For IDP scanning, the following signature groups are available for selection. The signature group names listed below are in the form:
			group_subgroupThe Type value of IDS, IPS or Policy for each entry is not given in the list because the entry may exist with more than one type.
https://www.clavister.com/advisories/idp
For further information about using these signatures, see Section 7.8, Intrusion Detection and Prevention.
| Group Name | Intrusion Type | 
|---|---|
| APP_AMANDA | Amanda, a popular backup software | 
| APP_ETHEREAL | Ethereal | 
| APP_ITUNES | Apple iTunes player | 
| APP_REALPLAYER | Media player from RealNetworks | 
| APP_REALSERVER | RealNetworks RealServer player | 
| APP_WINAMP | WinAMP | 
| APP_WMP | MS Windows Media Player | 
| AUTHENTICATION_GENERAL | Authenticantion | 
| AUTHENTICATION_KERBEROS | Kerberos | 
| AUTHENTICATION_XTACACS | XTACACS | 
| BACKUP_ARKEIA | Network backup solution | 
| BACKUP_BRIGHTSTOR | Backup solutions from CA | 
| BACKUP_GENERAL | General backup solutions | 
| BACKUP_NETVAULT | NetVault Backup solution | 
| BACKUP_VERITAS | Backup solutions | 
| BOT_GENERAL | Activities related to bots, including those controlled by IRC channels | 
| BROWSER_FIREFOX | Mozilla Firefox | 
| BROWSER_GENERAL | General attacks targeting web browsers/clients | 
| BROWSER_IE | Microsoft IE | 
| BROWSER_MOZILLA | Mozilla Browser | 
| COMPONENT_ENCODER | Encoders, as part of an attack. | 
| COMPONENT_INFECTION | Infection, as part of an attack | 
| COMPONENT_SHELLCODE | Shell code, as part of the attacks | 
| DB_GENERAL | Database systems | 
| DB_MSSQL | MS SQL Server | 
| DB_MYSQL | MySQL DBMS | 
| DB_ORACLE | Oracle DBMS | 
| DB_SYBASE | Sybase server | 
| DCOM_GENERAL | MS DCOM | 
| DHCP_CLIENT | DHCP Client related activities | 
| DHCP_GENERAL | DHCP protocol | 
| DHCP_SERVER | DHCP Server related activities | 
| DNS_EXPLOIT | DNS attacks | 
| DNS_GENERAL | Domain Name Systems | 
| DNS_OVERFLOW | DNS overflow attack | 
| DNS_QUERY | Query related attacks | 
| ECHO_GENERAL | Echo protocol and implementations | 
| ECHO_OVERFLOW | Echo buffer overflow | 
| FINGER_BACKDOOR | Finger backdoor | 
| FINGER_GENERAL | Finger protocol and implementation | 
| FINGER_OVERFLOW | Overflow for Finger protocol/implementation | 
| FS_AFS | Andrew File System | 
| FTP_DIRNAME | Directory name attack | 
| FTP_FORMATSTRING | Format string attack | 
| FTP_GENERAL | FTP protocol and implementation | 
| FTP_LOGIN | Login attacks | 
| FTP_OVERFLOW | FTP buffer overflow | 
| GAME_BOMBERCLONE | Bomberclone game | 
| GAME_GENERAL | Generic game servers/clients | 
| GAME_UNREAL | UnReal Game server | 
| HTTP_APACHE | Apache httpd | 
| HTTP_BADBLUE | Badblue web server | 
| HTTP_CGI | HTTP CGI | 
| HTTP_CISCO | Cisco Embedded Web Server | 
| HTTP_GENERAL | General HTTP activities | 
| HTTP_MICROSOFTIIS | HTTP Attacks specific to MS IIS web server | 
| HTTP_OVERFLOWS | Buffer overflow for HTTP servers | 
| HTTP_TOMCAT | Tomcat JSP | 
| ICMP_GENERAL | ICMP protocol and implementation | 
| IGMP_GENERAL | IGMP | 
| IMAP_GENERAL | IMAP protocol/implementation | 
| IM_AOL | AOL IM | 
| IM_GENERAL | Instant Messenger implementations | 
| IM_MSN | MSN Messenger | 
| IM_YAHOO | Yahoo Messenger | 
| IP_GENERAL | IP protocol and implementation | 
| IP_OVERFLOW | Overflow of IP protocol/implementation | 
| IRC_GENERAL | Internet Relay Chat | 
| LDAP_GENERAL | General LDAP clients/servers | 
| LDAP_OPENLDAP | Open LDAP | 
| LICENSE_CA-LICENSE | License management for CA software | 
| LICENSE_GENERAL | General License Manager | 
| MALWARE_GENERAL | Malware attack | 
| METASPLOIT_FRAME | Metasploit frame attack | 
| METASPLOIT_GENERAL | Metasploit general attack | 
| MISC_GENERAL | General attack | 
| MSDTC_GENERAL | MS DTC | 
| MSHELP_GENERAL | Microsoft Windows Help | 
| NETWARE_GENERAL | NetWare Core Protocol | 
| NFS_FORMAT | Format | 
| NFS_GENERAL | NFS protocol/implementation | 
| NNTP_GENERAL | NNTP implementation/protocol | 
| OS_SPECIFIC-AIX | AIX specific | 
| OS_SPECIFIC-GENERAL | OS general | 
| OS_SPECIFIC-HPUX | HP-UX related | 
| OS_SPECIFIC-LINUX | Linux specific | 
| OS_SPECIFIC-SCO | SCO specific | 
| OS_SPECIFIC-SOLARIS | Solaris specific | 
| OS_SPECIFIC-WINDOWS | Windows specific | 
| P2P_EMULE | eMule P2P tool | 
| P2P_GENERAL | General P2P tools | 
| P2P_GNUTELLA | Gnutella P2P tool | 
| PACKINGTOOLS_GENERAL | General packing tools attack | 
| PBX_GENERAL | PBX | 
| POP3_DOS | Denial of Service for POP | 
| POP3_GENERAL | Post Office Protocol v3 | 
| POP3_LOGIN-ATTACKS | Password guessing and related login attack | 
| POP3_OVERFLOW | POP3 server overflow | 
| POP3_REQUEST-ERRORS | Request Error | 
| PORTMAPPER_GENERAL | PortMapper | 
| PRINT_GENERAL | LP printing server: LPR LPD | 
| PRINT_OVERFLOW | Overflow of LPR/LPD protocol/implementation | 
| REMOTEACCESS_GOTOMYPC | Goto MY PC | 
| REMOTEACCESS_PCANYWHERE | PcAnywhere | 
| REMOTEACCESS_RADMIN | Remote Administrator (radmin) | 
| REMOTEACCESS_VNC-CLIENT | Attacks targeting at VNC Clients | 
| REMOTEACCESS_VNC-SERVER | Attack targeting at VNC servers | 
| REMOTEACCESS_WIN-TERMINAL | Windows terminal/Remote Desktop | 
| RLOGIN_GENERAL | RLogin protocol and implementation | 
| RLOGIN_LOGIN-ATTACK | Login attacks | 
| ROUTER_CISCO | Cisco router attack | 
| ROUTER_GENERAL | General router attack | 
| ROUTING_BGP | BGP router protocol | 
| RPC_GENERAL | RFC protocol and implementation | 
| RPC_JAVA-RMI | Java RMI | 
| RSYNC_GENERAL | Rsync | 
| SCANNER_GENERAL | Generic scanners | 
| SCANNER_NESSUS | Nessus Scanner | 
| SECURITY_GENERAL | Anti-virus solutions | 
| SECURITY_ISS | Internet Security Systems software | 
| SECURITY_MCAFEE | McAfee | 
| SECURITY_NAV | Symantec AV solution | 
| SMB_ERROR | SMB Error | 
| SMB_EXPLOIT | SMB Exploit | 
| SMB_GENERAL | SMB attacks | 
| SMB_NETBIOS | NetBIOS attacks | 
| SMB_WORMS | SMB worms | 
| SMTP_COMMAND-ATTACK | SMTP command attack | 
| SMTP_DOS | Denial of Service for SMTP | 
| SMTP_GENERAL | SMTP protocol and implementation | 
| SMTP_OVERFLOW | SMTP Overflow | 
| SMTP_SPAM | SPAM | 
| SNMP_ENCODING | SNMP encoding | 
| SNMP_GENERAL | SNMP protocol/implementation | 
| SOCKS_GENERAL | SOCKS protocol and implementation | 
| SSH_GENERAL | SSH protocol and implementation | 
| SSH_LOGIN-ATTACK | Password guess and related login attacks | 
| SSH_OPENSSH | OpenSSH Server | 
| SSL_GENERAL | SSL protocol and implementation | 
| TCP_GENERAL | TCP protocol and implementation | 
| TCP_PPTP | Point-to-Point Tunneling Protocol | 
| TELNET_GENERAL | Telnet protocol and implementation | 
| TELNET_OVERFLOW | Telnet buffer overflow attack | 
| TFTP_DIR_NAME | Directory Name attack | 
| TFTP_GENERAL | TFTP protocol and implementation | 
| TFTP_OPERATION | Operation Attack | 
| TFTP_OVERFLOW | TFTP buffer overflow attack | 
| TFTP_REPLY | TFTP Reply attack | 
| TFTP_REQUEST | TFTP request attack | 
| TROJAN_GENERAL | Trojan | 
| UDP_GENERAL | General UDP | 
| UDP_POPUP | Pop-up window for MS Windows | 
| UPNP_GENERAL | UPNP | 
| VERSION_CVS | CVS | 
| VERSION_SVN | Subversion | 
| VIRUS_GENERAL | Virus | 
| VOIP_GENERAL | VoIP protocol and implementation | 
| VOIP_SIP | SIP protocol and implementation | 
| WEB_CF-FILE-INCLUSION | Coldfusion file inclusion | 
| WEB_FILE-INCLUSION | File inclusion | 
| WEB_GENERAL | Web application attacks | 
| WEB_JSP-FILE-INCLUSION | JSP file inclusion | 
| WEB_PACKAGES | Popular web application packages | 
| WEB_PHP-XML-RPC | PHP XML RPC | 
| WEB_SQL-INJECTION | SQL Injection | 
| WEB_XSS | Cross-Site-Scripting | 
| WINS_GENERAL | MS WINS Service | 
| WORM_GENERAL | Worms | 
| X_GENERAL | Generic X applications |