It all depends on company's policies and procedure , on which traffic to 
monitor. Ideally, we should be monitoring incoming & outgoing traffic. This is 
not only true for RFI but for other signatures/exploits/ etc as well. T

Thanks,
Aditya Govind Mukadam

------------------------------------------------------------------------
Test Your IDS

Is your IDS deployed correctly?
Find out quickly and easily by testing it 
with real-world attacks from CORE IMPACT.
Go to 
http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw
 
to learn more.
------------------------------------------------------------------------

Reply via email to