This documentation will discuss intrusion detection and help you recognize and detect port probes, port scans, denial of service (DoS) attempts and unauthorized access attempts.