Configuring Ignored Intrusions