Also commonplace are situations in which IS and communications specialists have no trustworthy information on the protocols used in protected network segments. Using intrusion detection systems, you can control all the protocols and services used in the corporate network, as well as the frequency of their use. This will enable you to compose a scheme of information flows and create a network map, which is a mandatory requirement for successfully creating an information-security infrastructure.