Hi list, I need to hear what people consider what a good intrusion
detection/monitoring
product does.

My question is, in technical terms what would be practical to list as wanted
capabilities
in the intrusion detection system, what you think from a
professional/technical standpoint, what
should be included in a full featured system.

What types of attacks,  what specific ports, what patterns should a system
like this be watching for. What is the most common in attack seen today.

Thanks very much, Paul A

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to