The organization interconnects and configures individual intrusion detection tools into a systemwide intrusion detection system using common protocols.