Use this page to create a custom intrusion policy to suit your individual network.

Navigation: SERVICES > Intrusion system > Policies.

Name The name of the custom policy.
Comment An optional descriptive comment for the custom policy.
Signatures The list of available signatures that you can add to your custom policy.

Read more

About custom intrusion policies

Things you can do here

Creating custom intrusion policies

Something not right? .