[x]
Configuring attack detection and prevention > Attack detection and prevention configuration examples
Next