Use this tab to manage IPS Rules signatures, which are sets of rules that describe security threats and intrusions to a host or network. Each of the three types of IPS signatures, host (HIPS), custom (HIPS), and network (NIPS), has an associated severity level indicating the danger of the potential attack.