The smart Trick of ids That No One is Discussing
While some host-primarily based intrusion detection systems hope the log information being collected and managed by a different log server, others have their own individual log file consolidators built-in and also Collect other information, like network visitors packet captures.Doesn’t Protect against Assaults: IDS detects and alerts but doesn’