Advanced Threat Prevention Engine Settings
R81.10.X Quantum Spark 1500, 1600, 1800, 1900, 2000 Appliances Locally Managed Administration Guide|293
Threat Emulation
To configure the Threat Emulation settings:
1. Select one of the protected scope options:
n
Scan Incoming files from - Select one of these interfaces from which to scan
incoming files:
l
External and DMZ - Files that originate from external and the DMZ interfaces
are inspected.
Note - DMZ is not supported in 1530 / 1550 appliances.
l
External - Files that originate from external interfaces are inspected.
l
All - Files transferred between all interfaces are inspected.
Note - LAN to LAN scanning is not supported.
n
Scan both incoming and outgoing files - Files that originate from outside the
organization and from within the organization to the Internet are inspected.
2. Select the protocols to scan for the selected scope:
n
HTTP (on any port)
n
Mail (SMTP, POP3 and IMAP.
You must activate the SSL traffic inspection to scan HTTP and IMAP encrypted
traffic. To activate, click the link or go to Access Policy > SSL Inspection Policy.
3. For file type policy:
Process specific file type families - Click Configure for a list of file types and set
prescribed actions to take place when these files pass through the Threat Emulation
engine.
To edit an action for a specified file type, right-click the row and click Edit. You can also
click the file type so it is selected and then Click Edit.
The available actions are: