Configuring the Intrustion Prevention System