Reading intrusion alerts and resetting alert flags Notice of security violations How the intrusion log operates Keeping the intrusion log current by resetting alert flags Using the Event Log to find intrusion alerts (CLI)