I am a corporate network and server administrator at a consulting firm. I am beginning a project to leverage the technologies we already have in place. My goal is to design and implement a solution that includes intrusion detection, log management, event correlation, config management and better visibility into how our network is operating. As I embark on this project, I plan to write about the process, from product decisions to deployment and configuration. I hope you find this information helpful.