Create a Post
Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
icon Network Security

Part 11 - Threat Prevention

In Lecture 7, we mentioned different types of Security Policies, such as Access Control, Threat Prevention, and Desktop Security. Previous lectures have been primarily focused on Access Control, which uses the Firewall, Application Control, URL Filtering, and Content Awareness Software Blades to reduce the attack surface by allowing only authorized traffic to cross the security system.

In this lecture, we discuss the Threat Prevention policy, which deals with the traffic which is already allowed through Access Control policy.

Threat Prevention Software Blades

Threat Prevention includes the following Software Blades:

 

  1. IPS – Intrusion Prevention System provides protection against malicious and unwanted network traffic including known exploits and vulnerabilities, protocol misuse, outbound malware communication, and tunneling attempts.
  2. Anti-Bot – Detects bot-infected machines and prevents bot damages by blocking bot Command and Control communications.
  3. A
...
TO READ THE FULL POST it's simple and free
4 Comments
sgreen-crawco
Explorer

Very clear instructions and easy to follow!

Reimar_W
Participant

nice instruction

aqil01
Employee Alumnus
Employee Alumnus

Simplified tutorial indeed!!

Camila7
Explorer

👏