Change the Base Policy of an Intrusion Policy
You can choose a different system-provided or custom policy as your base policy.
You can chain up to five custom policies, with four of the five using one of the other four previously created policies as its base policy; the fifth must use a system-provided policy as its base.Procedure
Step 1 | Choose . |
Step 2 | Click Edit ( |
Step 3 | Choose a policy from the Base Policy drop-down list. |
Step 4 | Click Save. |
What to do next
Deploy configuration changes; see Deploy Configuration Changes.