DAHUA: How to Set Up Intrusion Detection