![]() ![]() Threat Prevention policy unifies the IPS, Anti-Virus, Anti-Bot, Threat Extraction, and Threat Emulation Software Blade policies.Access Control policy unifies the Firewall, Application Control & URL Filtering, Content Awareness, and Mobile Access Software Blade policies.Policy Layers and Sub-Policies can be managed by specific administrators, according to their permission profile, allowing easy responsibility delegation in the team.If the rule is not matched, the sub-policy is skipped.įor example, a sub-policy can manage a network segment or branch office. If the rule is matched, inspection continues in the sub-policy attached to the rule. Sub-Policies are sets of rules that you attach to specific rules. ![]() If an "Accept" action is done in a layer, inspection continues in the next layer. Layers are inspected in the order in which they are defined, giving control over the rule base flow and precedence of security functionality. Build a rule base with layers, each with a set of the security rules.Policy Layers and Sub-Policies enable flexible control over the security policy behavior.
0 Comments
Leave a Reply. |