This section describes the various options that you have for protecting your system. It includes:
Setting Up Protection Based on Application
Setting Up Protection by Configuration Changes
Configuring Advanced Rules for Security