Getting Started with Intrusion PoliciesThe following topics explain how to get started with intrusion policies: Intrusion Policy BasicsLicense Requirements for Intrusion PoliciesRequirements and Prerequisites for Intrusion PoliciesManaging Intrusion PoliciesCustom Intrusion Policy CreationEditing Snort 2 Intrusion PoliciesAccess Control Rule Configuration to Perform Intrusion PreventionDrop Behavior in an Inline DeploymentDrop Behavior in a Dual System DeploymentIntrusion Policy Advanced SettingsOptimizing Performance for Intrusion Detection and PreventionRelated ConceptsHow Policies Examine Traffic For Intrusions