Watch this video on YouTube
What is the most important consideration when implementing an intrusion detection system (IDS)?