Tuning Intrusion Policies Using Rules

The following topics explain how to use rules to tune intrusion policies: