Additional Intrusion Detection methods

To detect intrusions, you can use the following additional methods:

You can enable or disable methods. Additional Intrusion Detection methods can be applied regardless of whether Intrusion Detection rules exist or are enabled. Additional detection methods use built-in algorithms.

Page top