Attack detection and prevention configuration examples