Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Setting Up an Intrusion Detection System: Page 5 of 8

There are now also intrusion-prevention systems that take action against attacks themselves. Some are closely tied to firewalls or routers, while others incorporate firewall functions. In either case, the core IPS system still depends on an up-to-date signature file for recognizing illicit behavior and reacting to it.

Curtis Franklin Jr. is a senior technology editor for Network Computing. He has been writing about the computer and network industries since 1985. Write to him at [email protected].

To Get the Most out of your IDS ...

1. Be prepared to invest in staff for both initial setup and continued care and feeding.

2. Stay current. Get patches for OSs, servers and clients up to date, and remediate vulnerabilities before the IDS deployment.