EasyManua.ls Logo

Quantum SPARK 1500 - Threat Emulation

Quantum SPARK 1500
461 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Advanced Threat Prevention Engine Settings
R81.10.X Quantum Spark 1500, 1600, 1800, 1900, 2000 Appliances Locally Managed Administration Guide|293
Threat Emulation
To configure the Threat Emulation settings:
1. Select one of the protected scope options:
n
Scan Incoming files from - Select one of these interfaces from which to scan
incoming files:
l
External and DMZ - Files that originate from external and the DMZ interfaces
are inspected.
Note - DMZ is not supported in 1530 / 1550 appliances.
l
External - Files that originate from external interfaces are inspected.
l
All - Files transferred between all interfaces are inspected.
Note - LAN to LAN scanning is not supported.
n
Scan both incoming and outgoing files - Files that originate from outside the
organization and from within the organization to the Internet are inspected.
2. Select the protocols to scan for the selected scope:
n
HTTP (on any port)
n
Mail (SMTP, POP3 and IMAP.
You must activate the SSL traffic inspection to scan HTTP and IMAP encrypted
traffic. To activate, click the link or go to Access Policy > SSL Inspection Policy.
3. For file type policy:
Process specific file type families - Click Configure for a list of file types and set
prescribed actions to take place when these files pass through the Threat Emulation
engine.
To edit an action for a specified file type, right-click the row and click Edit. You can also
click the file type so it is selected and then Click Edit.
The available actions are:

Table of Contents

Related product manuals