Protect your network — configure firewall rules, tune intrusion detection, and discuss threat mitigation