- Ignoring frequent false positives
 - Avoiding IPSec to support NIDS
 - Monitoring only inbound connections
 - Using shared network resources to gather NIDS data
 - Trusting IDS analysis to non-expert analysts
 
http://articles.techrepublic.com.com/5100-6350-5785230.html

1 comment:
Good words.
Post a Comment