Intrusion Detection and Prevention Network Analysis and Intrusion Policies OverviewGetting Started with Intrusion PoliciesTuning Intrusion Policies Using RulesCustom Intrusion RulesLayers in Intrusion and Network Analysis PoliciesTailoring Intrusion Protection to Your Network AssetsSensitive Data DetectionGlobal Limit for Intrusion Event LoggingIntrusion Prevention Performance Tuning