- Table of Contents
-
- 05-Objects
- 01-Health monitoring
- 02-User management
- 03-Authentication
- 04-Portal
- 05-WAF
- 06-IPS
- 07-Anti-virus
- 08-Data filtering
- 09-URL filtering
- 10-File filtering
- 11-APT defense
- 12-APR
- 13-Terminal identification
- 14-Security action
- 15-Advanced settings
- 16-Intelligences from the threat management platform
- 17-Object group
- 18-ACL
- 19-SSL
- 20-Public key management
- 21-PKI
- 22-Attack defense
- 23-Trusted access controllers
- Related Documents
-
Title | Size | Download |
---|---|---|
16-Intelligences from the threat management platform | 19.91 KB |
Intelligences from the threat management platform
Introduction
The device supports receiving intelligences from the threat management platform, including IP reputation and MD5 reputation. The intelligences supplement the locally loaded reputation and antivirus signature libraries, improving security for internal network users.
Restrictions and guidelines
· To ensure successful receiving of intelligences from the threat management platform, enable NETCONF over SOAP on the device by executing netconf soap http enable and netconf soap https enable commands from the CLI of the device.
· To use the threat intelligences correctly, configure IP reputation and anti-virus features first on the device.