The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Generic issues with the deployment of wireless intrusion detection systems are discussed in this paper. In addition, preliminary findings and analysis from the data collected in the pilot study using the wireless enabled snort intrusion detection system are also presented.