Hence, what is needed is a method and an apparatus that allows configuration information and other types of information related to network security and intrusion detection to be communicated in a form that can be interpreted across a variety of different computing platforms.