A tip on using IPS
Turning all of the SNORT IPS rules on may not be a good idea.
The reason is that you may lock your system down so much that you won't be able to access things you need and you'll be wondering what is wrong.
An example of this is accessing HTTPS on non-standard ports, running a local SQL replication server, running a Dynamic DNS client and many other things.
The general idea is to enable IPS but keep an eye on your IPS log files.
When you find something suspicious you want to block, take a note of it's rule number and activate the rule.
Here is an example.
I found this in my IPS log file:
Intrusio.. 2010-03-11 20:40:56 snort[19131]: [1:2003020:9] ET POLICY TLS/SSL Encrypted Application Data on Unusual Port [Classification: A client was using an unusual port] [Priority: 2]: {TCP} 192.168.30.33:3061 -> 208.87.32.68:1765
Basically, this reads that one of my PCs was communicating with another using an encrypted connection on port 1765.
The normal SLL port should be 443, so this connection is alarming to me.
I have a look at the user's machine (local IP 192.168.30.33) and find that it is infected with a virus I just can't remove at the moment.
So how do I activate the specific rule that detected this and prevent further communication? - there are thousands of rules!
To do this, I look at the above log entry and find the snort rule number. In this case it's 2003020
I go to my Endian GUI
Services --> Intrusion Prevention --> Editor
Select all the rule groups with your mouse (Click on first rule at the top - scroll down - hold shift key - click on the last rule)
Enter the rule number you are searching for in the Search box (2003020)
Press Enter.
The Rule will now be displayed in the results section.
To activate this rule click on the Yellow icon so it changes to a Red shield.
Click apply.
The rule is now active.