Hi list, I need to hear what people consider what a good intrusion
detection/monitoring
product does.
My question is, in technical terms what would be practical to list as wanted
capabilities
in the intrusion detection system, what you think from a
professional/technical standpoint, what
should be included in a full featured system.
What types of attacks, what specific ports, what patterns should a system
like this be watching for. What is the most common in attack seen today.
Thanks very much, Paul A
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]