IDS strategies require on-going maintenance to ensure latest attacks will be detected and that the logs are carefully archived for future analysis and reference. As we have seen, we cannot be complacent by solely relying on the automated triggering of alerts or the lack of triggered alerts.