Complete documentation for Intrusion Detection
Complete guide for configuration
Complete guide for overview