Skip to content
Cloudflare Docs

Enable IDS

Cloudflare's Intrusion Detection System (IDS) is an Advanced Magic Firewall feature you can use to actively monitor for a wide range of known threat signatures in your traffic. An IDS expands the security coverage of a firewall to analyze traffic against a broader threat database, detecting a variety of sophisticated attacks such as ransomware, data exfiltration, and network scanning based on signatures or “fingerprints” in network traffic.

With Cloudflare's global anycast network, you get:

  • Cloudflare's entire global network capacity is now the capacity of your IDS.
  • Built-in redundancy and failover. Every server runs Cloudflare's IDS software, and traffic is automatically attracted to the closest network location to its source.
  • Continuous deployment for improvements to Cloudflare's IDS capabilities.

Refer to Enable IDS for more information on enabling IDS and creating new rulesets. After IDS is enabled, your traffic will be scanned to find malicious traffic. The detections are logged to destinations that can be configured from the dashboard. Refer to Use Logpush with IDS for instructions on configuring a destination to receive the detections. Additionally, all traffic that is analyzed can be accessed via network analytics. Refer to GraphQL Analytics to query the analytics data.

Cloudflare's IDS takes advantage of the threat intelligence powered by our global network and extends the capabilities of the Cloudflare Firewall to monitor and protect your network from malicious actors.

Enable IDS

You can enable IDS through the dashboard or via the API.

  1. In the Cloudflare One dashboard, go to Traffic policies.
  2. Select Policy settings and turn on IDS.

IDS rules

IDS rules are run on a subset of packets. IDS also supports the current flows:

  • Magic WAN to Magic WAN.
  • Magic Transit ingress traffic (when egress traffic is handled through direct server return).
  • Magic Transit ingress and egress traffic when Magic Transit has the Egress option enabled.

Next steps

You must configure Logpush to log detected risks. Refer to Configure a Logpush destination for more information. Additionally, all traffic that is analyzed can be accessed via network analytics. Refer to GraphQL Analytics to query the analytics data.