This is an amazing service. At this point, combined with the CloudWatch to Kinesis announcement earlier, AWS can pretty much act as a near-realtime IDS. If every packet headed into the VPC can be collected, analyzed, and acted upon, the opportunity is endless.
On a practical note, I enabled this on an account and have setup metrics filters. Being able to see charts and graphs of failed SSH attempts and attacks by port is really cool.
Even if you run a low-traffic or no-traffic instance you'll almost undoubtedly have REJECT packets. I enabled it on a VPC I barely use and had 100 events in a few minutes of rejected packets from port scanners and other attackers.
I really wish they would give us a way to get full packet capture from the entire VPC.
Simply add a span option, that we can send all traffic to a specific network interface (ENI). Or at the very least allow us to define custom routers (verses the VPC routes), where we could then capture/span/analyze/etc - this would provide us the means to analyze traffic from one VPC to another and inbound/outbound traffic.
On a practical note, I enabled this on an account and have setup metrics filters. Being able to see charts and graphs of failed SSH attempts and attacks by port is really cool.