Examples: Intrusion detection Use the examples in this section to create various types of intrusion detection policies.