ContentMonitoring Security from the Inside Out: Intrusion Detection at the Configuration LevelAndy EvansJanuary 15, 2004Today’s intrusion detection (ID) technology is, for the most part, network-centric.