Section 2.1, Configuring a Risk Policy
Section 2.2, Configuring Risk Rules
Section 2.3, Enabling User History
Section 2.4, Configuring NAT Settings
Section 2.5, Configuring Behavioral Analytics
Section 2.6, Sample Configuration: Demo Risk Policy