Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] HIDS (host-based intrusion detection systems) hierarchical management model HIPS (host-based intrusion prevention systems) 2nd benefits of acceptable use policy enforcement attack prevention internal attack propagation prevention patch relief policy enforcement endpoint agents access control process limitations of, acceptable use policy enforcement management infrastructure management center management interface required capabilities role in layered defense security policies anomaly-based atomic-rule based behavioral home office IPS deployment HIPS implementation limiting factors NIPS implementation security policy goals Host IPS deploying role in layered defense signature tuning host-based signatures atomic stateful triggering mechanisms host-level attack mitigation antivirus HIDS personal firewalls hosts, classifying hubs hybrid IPS/IDS systems 2nd |