Methods and systems for remotely configuring and monitoring a
communication device are provided, especially useful in a computer
network environment such as the Internet. A communication device or
network appliance compares communications entering the communication
device to a list of communication types established as known security
risks, for example hacker attacks, unauthorized attempted access to
network resources, or similar network security threats. If the received
communication corresponds to a known security risk, the communication is
classified as either a high security risk or low security risk, and an
alert signal is transmitted to a remote monitoring center. Upon receiving
the alert signal, the remote monitoring center assigns a priority to the
alert signal based upon the type of the communication that triggered the
transmission of the alert signal. Based on the assigned priority, the
prioritized alert signal is then forwarded to a remote monitoring agent
for resolution. The remote monitoring agent may then analyze the
communication, contact the end user of the communication device with an
appropriate resolution, or take other appropriate action in response to
the received communication. The communication device may also be remotely
configured.