Print Download Complete help as Archive Send Feedback

Previous

Next

Threat Emulation - General

What can I do here?

Use this window to configure general Threat Emulation settings.

Getting Here

Getting Here - Security Policies Threat Prevention > Policy > Threat Tools > Profiles > Profile > Threat Emulation - General

Configuring Threat Emulation Settings

Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly. To do this:

  1. In SmartConsole, click Gateways & Servers and double-click the Security Gateway.

    The gateway window opens and shows the General Properties page.

  2. From the navigation tree, click Network Management and then double-click a DMZ interface.
  3. In the General page of the Interface window, click Modify.
  4. In the Topology Settings window, click Override and Interface leads to DMZ.
  5. Click OK and close the gateway window.

Do this procedure for each interface that goes to the DMZ.

If there is a conflict between the Threat Emulation settings in the profile and for the Security Gateway, the profile settings are used.

To configure Threat Emulation settings for a Threat Prevention profile:

  1. In SmartConsole, select Security Policies > Threat Prevention.
  2. From the Threat Tools section, click Profiles.

    The Profiles page opens.

  3. Right-click the profile, and click Edit.
  4. From the navigation tree, go to Threat Emulation and configure these settings:
    1. General Threat Emulation Settings.
    2. Emulation Environment
    3. Advanced Threat Emulation Settings.
  5. Click OK and close the Threat Prevention profile window.
  6. Install the Threat Prevention policy.
Threat Emulation General Settings

On the Threat Emulation > General page, you can configure these settings:

UserCheck Settings:

Protected Scope:

Select an interface type and traffic direction option:

Protocols

Protocols to be emulated:

File Types

Here you can configure the Threat Emulation Action and Emulation Location for each file type scanned by the Threat Emulation blade. Select one of these:

Archives

Block archives containing these prohibited file types. Click Configure to select the prohibited file types. If a prohibited file type is in an archive, the gateway drops the archive.

Emulation Environment

You can use the Emulation Environment window to configure the emulation location and images that are used for this profile:

Advanced Threat Emulation Settings