Detecting Security Threats: How to Set up Alerts and Prevent Threats?