While some host-based mostly intrusion detection systems hope the log files for being collected and managed by a separate log server, Other people have their own personal log file consolidators crafted-in in addition to Collect other facts, such as network targeted traffic packet captures.Usually, a NIDS is set up with a devoted piece of hardware.