What it is
An Intrusion Detection System monitors events and traffic to identify suspicious activity and potential attacks. It generates alerts for investigation, and in many programs it feeds a SIEM or SOAR workflow.
Key points
- Network IDS inspects packets and flows.
- Host IDS monitors processes, files, and logs.
- Tune rules to reduce false positives.
Concrete example
A company runs network IDS at the internet edge and between key segments, plus host based sensors on critical servers. Alerts are enriched with asset criticality and user identity, then triaged through a SIEM with defined response playbooks.