Reading intrusion alerts and resetting alert flags Notice of security violations How the intrusion log operates Keeping the intrusion log current by resetting alert flags