Intrusion system components in 10 minutes