This document discusses using intrusion detection system (IDS) tools and techniques in computer forensics. It asks the reader to find an example of how IDS tools or methods have contributed to a successful forensic investigation or how a particular IDS product could support forensic analysis more generally. The example should summarize how IDS information has helped solve a case or how an IDS tool could aid forensic examination.