To achieve the monitoring criteria, you must configure the detection of many staged attacks. What should you do?