With Threat Protection profiles, you can analyze files for malware inspection and threat blocking. This section will demonstrate how to create profiles that will later be installed in the policies.

Click on the "Threat Protection" tab.

Threat Protection Tab

The “Threat Protection” screen will appear. It consists of the “Name”, “Description”, “Version” and “Actions” columns. In addition, the search bar is located at the top right of the screen and the actions menu.

ProfilesThreat Protection

Next, the actions menu will be analyzed and later we will delve into the content of the Threat Protection panel columns.

  • No labels