EasyManua.ls Logo

Check Point HARMONY R81 - Configuring Threat Extraction and Threat Emulation Rules

Check Point HARMONY R81
451 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Threat Extraction and Threat Emulation Rules
R81 Harmony Endpoint Server Administration Guide|338
Configuring Threat Extraction and Threat
Emulation Rules
For each Action in a rule, select an option, which defines the Action behavior. You can select a
predefined Action option or select New to define a custom Action option.
Right-click an Action and select Edit or Edit Shared Action to change the Action behavior.
Changes to policy rules are enforced only after you install the policy.

Table of Contents

Related product manuals