answersLogoWhite

0

If you aren't using an IDS (intrusion detection system) then you have to examine the system/audit logs of the computer that may be an intrusion.

That may or may not indicate a problem. Sometimes that information isn't specifically put anywhere.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

Use intrusion in a sentence?

The security system was able to detect the intrusion into the bank and the police were alerted.


What is the input and output of an alarm?

the inputs are the sensors that detect intrusion, the outputs are the siren and the lights


What does intrusion detection system ids do?

Intrusion systems ids records and reports activities on computers. It is used to detect malicious activities and attacks on networks and computers. They were primary developed for military.


Computer-based devices that examine each packet they detect are called?

Usually clumped together as firewalls. Devices like them are IPS - Intrusion protection system. IDS - Intrusion detection system.


When there is an igneous intrusion and a fault line which one is younger?

That depends! If the fault line cross cuts the igneous intrusion causing the intrusion to be displaced on either side of the fault and forming a broken mass of rock within the intrusion known as a fault breccia then the fault is younger than the intrusions, as the intrusion must have already existed for the fault to cause it's displacement. If on the other hand the igneous intrusion cross cuts the fault and is un-deformed then it is probable that it is younger than the fault.


What are the relative ages of igneous intrusion and overlying sedimentary rock layers that dome upward?

The igneous intrusion is typically younger than the overlying sedimentary rock layers in a dome structure. The intrusion must have occurred after the deposition of the sedimentary layers and caused them to deform and dome upward due to the force of the molten rock pushing through.


What does intrusion?

An intrusion can be either the act of intruding (an intrusion into his private life) or a thing that intrudes (the excavations were an intrusion on their heritage).


Which network tool would you use to detect and prevent any illegal network activity?

Network-based Intrusion Prevention (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity.A reactive NIDS can also be called a network intrusion prevention system (NIPS).


What can automatically detect and deny network access to a host whose traffic patterns appear suspicious?

well, a firewall could do it, but an Intrusion Prevention System is the more obvious answer.


What's a ge alarm system used for?

Most of the models from GE are intended for use as a wireless security system. They'll basically detect intrusion into your home, and then trigger an alarm.


What part of speech is intrusion?

Intrusion is a noun.The word 'intrusion' is a noun.


What is an Incident or Intrusion?

Incident=an event Intrusion=an interruption.