Configure Intrusion Prevention (IPS) Profiles
Intrusion Prevention (IPS) detects a large number of known threats. Sets of settings are grouped together in profiles, which you can specify in access rules. Secure Access provides several pre-configured profiles that address common needs, such as Balanced Security and Connectivity or Maximum Security. Or you can create a custom profile using Snort signatures. You can also choose to block or just monitor traffic that matches a profile.
You can choose a different IPS profile for each access rule based on the balance of convenience vs. risk appropriate for the particular traffic.
For details, see Manage IPS Profiles.