This section describes several security rule entry examples commonly found in security metadata files and templates.