Figure 7-7. Configuring Security Monitor from the Network Monitor Control Tool.