Configuring Intrusion Prevention System