Summary:

  1. Create a vulnerability profile

  2. Attach it to a security policy  

Note, if you want to check all signatures, you can check "Show all signatures" button