Specific Threat DetectionThe following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat DetectionLicense Requirements for Specific Threat DetectionRequirements and Prerequisites for Specific Threat DetectionBack Orifice DetectionPortscan DetectionRate-Based Attack Prevention