Customize threat detections by enabling and disabling detection rules.
Access the Threat Encyclopedia to learn more about detection rules, such as
confidence level, overview, technical details, and more. To access the Threat Encyclopedia,
in
the management console go to and then browse the Network Content Inspection Rules or
search for a specific rule number.