You can do the following with security rules:
When creating a new rule, you can configure filtering criteria and select an action to apply to traffic.
You can clone a security rule selected in the table.
After creating a security rule, you can go back to manage its settings.
You can delete a security rule if you do not want it to be applied to network traffic and displayed in the rules table.
You can enable or disable a security rule in the table of rules or in the rule editing window.
You can increase or decrease the priority of a security rule selected in the table.