Intrusion User Guides