SIEM configurations, log correlation rules, threat detection queries, and security dashboard templates.