What three elements can be configured in firewall polices to detect network-based malware? (Choose three.)