Configuration rules are instructions a system administrator codes into a security device to specify how it operates.True
Network configuration rules are first done by assigning the preferred network settings, policies, flows, and controls. This changes the design of the device according to administrator or user specifications.
The two phases or steps of Configuration involves
Read more on Configuration rules in Network Systems here: https://brainly.com/question/13164289