An IDS only must detect potential threats. It is placed outside of band around the community infrastructure. Therefore, It's not necessarily in the true-time conversation route amongst the sender and receiver of information. Use network standardization to aid automation Community groups can automate and standardize network designs to improve configurations, https://ids78899.bloggosite.com/40294686/the-5-second-trick-for-ids