Examples: Intrusion detection

Use the examples in this section to create various types of intrusion detection policies.