Tuning Intrusion Policies Using RulesThe following topics explain how to use rules to tune intrusion policies: Intrusion Rule Tuning BasicsIntrusion Rule TypesLicense Requirements for Intrusion RulesRequirements and Prerequisites for Intrusion RulesViewing Intrusion Rules in an Intrusion PolicyIntrusion Rule Filters in an Intrusion PolicyIntrusion Rule StatesIntrusion Event Notification Filters in an Intrusion PolicyDynamic Intrusion Rule StatesAdding Intrusion Rule CommentsRelated TasksSetting Drop Behavior in an Inline Deployment