In this chapter, you first saw how IDM and IEV together provide an IDS management and monitoring solution for small-scale IDS deployments. You then learned how to install IEV and how to add devices so that you can view and filter their event logs in IEV. After seeing how you can create custom views in IEV, you saw how the NSDB provides signature information and vulnerability reports for IDS signatures. We described the method of creating filters that allow for a more manageable way to view events before finally going through how you customize IEV application settings and preferences.