FOR THE WIN!
Antivirus
Security profile for detecting and preventing viruses
Anti-Spyware
Security profile for detecting and preventing spyware
Vulnerability Protection
Security profile for identifying and addressing vulnerabilities
URL Filtering
Security profile for controlling access to URLs
WildFire Analysis
Security profile for analyzing files with WildFire
Configure threat prevention policy
Setting up policies to prevent security threats
Enable DNS Security to control traffic based on domains
Activating DNS Security to manage traffic based on domains
Configure DNS Security
Setting up DNS Security configurations
Apply DNS Security in policy
Incorporating DNS Security into security policies
Apply a URL profile in a Security policy
Using a URL profile within security policies
Create a URL Filtering profile
Establishing a profile for URL filtering
Create a custom URL category
Generating a personalized category for URLs
Control traffic based on a URL category
Regulating traffic according to URL categories
Why a URL was blocked
, Reasons for blocking a specific URL
How to allow a blocked URL
Steps to permit access to a previously blocked URL
How to request a URL recategorization
Process for asking to reclassify a URL
How to control access to specific locations
Managing access to particular areas
How to apply to specific policies
Implementing controls in designated security policies
Identify users within the ACC and the monitor tab
Recognizing users in the Application Command Center and monitoring section
Cyber-Attack Lifecycle
The stage where the attacker can run malicious code is called Exploitation.
Antivirus updates interval
The recommended interval for antivirus updates for mission critical devices is daily.
IP Wildcard Mask
An address object of type IP Wildcard Mask can only be referenced in a Security policy rule.
IP Wildcard Mask format
Enter an IP wildcard address in the format of an IPv4 address followed by a slash and a mask (e.g.,
10.182.1.1/0.127.248.0).
Authentication methods for role-based access control
SAML and TACACS+ support authentication and authorization.
Service groups
Used to set up a group of objects based on their ports alone.
Security Profile
Can block or allow traffic after it is matched to a Security policy rule that allows traffic.
Application Filter
Available filter columns include Parent App, Category, and Risk.
Domain Generation Algorithms (DGAs)