Configuring a security risk detection