A method and system that enables a security policy to separate
developer-provided detection criteria from an administrator-provided
custom policy is provided. The security system allows a developer of
detection criteria to provide a signature file containing the signatures
that are available for use by a security policy. The security system also
allows an administrator of a computer system to specify a custom policy
that uses the signatures of the signature file. The developer may
distribute the signature file to host computer systems independently of
the administrator's distribution of the rules of the custom policy to the
host computer systems. When a security enforcement event occurs at the
host computer system, the security system applies the rules of the
security policy to the event.