The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.