FOR THE WIN!
Antivirus
Security profile for detecting and preventing viruses
Anti-Spyware
Security profile for detecting and preventing spyware
Vulnerability Protection
Security profile for identifying and addressing vulnerabilities
URL Filtering
Security profile for controlling access to URLs
WildFire Analysis
Security profile for analyzing files with WildFire
Configure threat prevention policy
Setting up policies to prevent security threats
Enable DNS Security to control traffic based on domains
Activating DNS Security to manage traffic based on domains
Configure DNS Security
Setting up DNS Security configurations
Apply DNS Security in policy
Incorporating DNS Security into security policies
Apply a URL profile in a Security policy
Using a URL profile within security policies
Create a URL Filtering profile
Establishing a profile for URL filtering
Create a custom URL category
Generating a personalized category for URLs
Control traffic based on a URL category
Regulating traffic according to URL categories
Why a URL was blocked
, Reasons for blocking a specific URL
How to allow a blocked URL
Steps to permit access to a previously blocked URL
How to request a URL recategorization
Process for asking to reclassify a URL
How to control access to specific locations
Managing access to particular areas
How to apply to specific policies
Implementing controls in designated security policies
Identify users within the ACC and the monitor tab
Recognizing users in the Application Command Center and monitoring section
Application Filters
Used in firewall policy to group applications.
Application Filter
A dynamic way to group applications and can be configured as a nested member of an Application
Group.
Application Group
A static way of grouping applications and can be configured as a nested member of an Application
Group.
Applications and Threats dynamic update scheduling
Automatically 'download only' and then install Applications and Threats later, after the administrator
approves the update.
Threshold
Determines the amount of time the firewall waits before installing the latest content, with a maximum
of up to a 48 hour threshold in a mission-critical network.
Secure Shell (SSH) Security Policy
The admin creates a custom service object named 'tcp-4422' with port tcp/4422 and a custom service
object named 'tcp-22' with port tcp/22, then creates a Security policy allowing application 'ssh', service
'tcp-4422', and service 'tcp-22'.
DNS Security service configuration
Configured in the Anti-Spyware threat profile object.