You are here: Product Documentation > Unified Threat Management > About the Services Menu > Managing the Intrusion System

Managing the Intrusion System

Note: This topic applies to the Glamis Release.

Note: A Unified Threat Management serial is required use the Intrusion System. For more information, contact your Smoothwall representative.

The Intrusion System performs real-time packet analysis on all network traffic in order to detect and prevent malicious network activity. The Smoothwall can detect a vast array of well-known service exploits including buffer overflow attempts, port scans and CGI attacks.

All violations are logged and the logged data can be used to strengthen the firewall by creating IP block rules against identified networks and source IPs.