Tailoring Intrusion Protection to Your Network AssetsThe following topics describe how to use Cisco recommended rules: About Cisco Recommended RulesDefault Settings for Cisco RecommendationsAdvanced Settings for Cisco RecommendationsGenerating and Applying Cisco RecommendationsScript Detection