Protecting Your Network See the following topics to learn about features you can configure to protect your network: Access Control Policies Security Intelligence Getting Started with Intrusion Policies Tuning Intrusion Policies Using Rules Custom Intrusion Rules Update Intrusion Rules Global Limit for Intrusion Event Logging Transport and Network Layer Preprocessors Specific Threat Detection Device Management Updates