<br><font size=2 face="sans-serif">Margo,</font>
<br>
<br><font size=2 face="sans-serif">For Network monitoring that's not MS, never go past snort.</font>
<br>
<br><font size=2 face="sans-serif">http://www.snort.org</font>
<br>
<br><font size=2 face="sans-serif">It's a freeware Intruder Detection System ( IDS ) that works great, thanks.</font>
<br>
<br><font size=2 face="sans-serif">There's also lots of doc/howtos/guidance on the site, as well as a "step by step" guide from SANS as to how one might use snort to put an IDS service in place here:</font>
<br>
<br><font size=2 face="sans-serif">http://www.giac.org/practical/GSEC/George_Plytas_GSEC.pdf</font>
<br>
<br><font size=2 face="sans-serif">Hope this helps,</font>
<br>
<br><font size=2 face="sans-serif">Regards,</font>
<br>
<br><font size=2 face="sans-serif">tom.</font>
<br><font size=2 face="sans-serif">----------------------------------------------------------------------------------------<br>
Tom Cleary - Security Architect<br>
<br>
CSC Perth<br>
<br>
"In IT, acceptable solutions depend upon humans - Computers don't negotiate."<br>
----------------------------------------------------------------------------------------<br>
This is a PRIVATE message. If you are not the intended recipient, please delete without copying and kindly advise us by e-mail of the mistake in delivery. NOTE: Regardless of content, this e-mail shall not operate to bind CSC to any order or other contract unless pursuant to explicit written agreement or government initiative expressly permitting the use of e-mail for such purpose.<br>
----------------------------------------------------------------------------------------<br>
</font>