Configuration of network infrastructure, console data storage and how the {{COMPANY_NAME}} {{PRODUCT_NAME}} functions in your environment in relation to other network security tools such as IDS systems is covered in the following sections.