You configure security policies at the security-policy level. 12.10.1. Configuring content filtering 12.10.2. Configuring safe browsing 12.10.3. Configuring tunnel inspection rules 12.10.4. Configuring SSL inspection 12.10.5. Configuring SSH inspection 12.10.6. Configuring IPS 12.10.7. Configuring scenarios 12.10.8. Configuring mail security rules 12.10.9. Configuring ICAP rules 12.10.10. Configuring ICAP servers 12.10.11. Configuring DoS rules 12.10.12. Configuring DoS profiles ‹ 12.9.4. Configuring traffic shaping rules up 12.10.1. Configuring content filtering ›