Problem solve Get help with specific problems with your technologies, process and projects.

Video: OSSEC screenshots show how to use the free IDS

An intrusion detection system has become necessary for most enterprises, but they can be both expensive and difficult to configure. In part two of this screencast, learn how to use the free IDS OSSEC.

The evolving threat landscape has made an intrusion detection system necessary for most enterprises, but IDSes...

can be both expensive and difficult to configure.

In part two of this screencast, Peter Giannoulis of uses OSSEC screenshots to demonstrate a few of the many functions this free IDS boasts.

Want more demos of free security tools? Visit our screencast page.

About the presenter:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security consultant in Toronto, Ontario. He currently maintains The Academy Pro, which provides streaming video for enterprises and consumers on how to configure and troubleshoot many of today's top security products. He also serves as a technical director for GIAC.

This was last published in November 2010

Dig Deeper on Open source security tools and software



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.







  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...