Additional Intrusion Detection methods

You can apply the following additional methods for Intrusion Detection:

You can enable and disable these methods. You can apply additional Intrusion Detection methods regardless of the availability and state of Intrusion Detection rules. Embedded algorithms are used for the additional scan methods.

Page top