Intrusion prevention With intrusion prevention, you can examine network traffic for anomalies to prevent DoS and other spoofing attacks. Using policies, you can define rules that specify an action to take when traffic matches signature criteria. Wireless protection allows you to configure and manage access points, wireless networks, and clients.