User guide

Chapter 9: Configuring Other Intrusion Prevention Settings
96