The
tab provides an interface to create and deploy rules to detect suspicious or malicious patterns of events.In the
tab, you can:Create and edit rules
Deploy/undeploy rules
Add an action and associate it to a rule
Configure dynamic lists
For trademark and copyright information, see Legal Notices.