Uploaded by janos.szonyi

userid-note

advertisement
Security Profiles
Security Profiles are added to the end of Security policy rules.
After a packet has been allowed by the Security policy, Security
Profiles are used to scan packets for threats, vulnerabilities,
viruses, spyware, malicious URLs, data exfiltration, and
exploitation software. Traffic also can be scanned for suspicious
file uploads.
A Security Profile Group can be created that includes one or more
Security Profiles, which simplifies the task of adding Security
Profiles to a Security policy rule.
The following table describes the Security Profile types:
Threat Logs
Threats are recorded and logged in the Threat log. A Threat log
display entries when traffic matches one of the Security Profiles
attached to a Security policy rule on the firewall. Each entry
includes the following information: date and time; type of threat
(such as virus or spyware); threat description or URL (Name
column); source and destination zones, addresses, and ports;
application name; alarm action (such as allow or block); and
severity level. The Threat log is used as the source of information
that is displayed on the ACC tab (Application Control Center).
Download