You are here: Product Documentation > Unified Threat Management > About the Services Menu > Services > Intrusion system > IDS

Deploying Intrusion Detection Policies

Note: This topic applies to the Hearst Release.

The Intrusion System’s default policies enable you to deploy Intrusion Detection immediately to identify threats on your network. Any custom policies you create are deployed in the same method.