Rumored Buzz on ids
While some host-centered intrusion detection systems expect the log documents to generally be gathered and managed by a independent log server, others have their very own log file consolidators crafted-in and in addition Acquire other information and facts, for example community visitors packet captures.Typically, a NIDS is set up with a dedicated