After a protected group is created, you can adjust the resources and protection policies of the protected group based on the site requirements to better adapt to the live network environment.