The figure shows how an IPS works. Data travels from a user to the IPS sensor which compares the traffic with known malicious signatures. The sensor drops any data that it dtermines is maicious. The management concols logs the events.

 4.3.4 Security devices