What can I do here?
Use this window to set the number of times that users get UserCheck messages for accessing applications that are not permitted by the policy.
Getting Here - Security Policies > Threat Prevention > Policy > Threat Tools > Profiles > Profile > Anti-Bot / Anti-Virus > UserCheck Settings > Show: Custom Frequency > Configure |
You can configure Threat Prevention to exclude files from inspection, such as internal emails and internal file transfers. These settings are based on the interface type (internal or external, as defined in SmartConsole) and traffic direction (incoming or outgoing).
Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly.
Do this procedure for each interface that goes to the DMZ.
You can configure the Anti-Virus profile to enable archive scanning. The Anti-Virus engine unpacks archives and applies proactive heuristics. If you use this feature, it can have an impact on network performance.
Note - The MIME Nesting settings are the same for Anti-Virus and Threat Emulation. |
UserCheck Messages
Select the UserCheck Messages options:
Protected Scope
Protocol
Select the protocols that Anti-Virus scans:
File Types
Select the File Types that Anti-Virus scans:
Archives
Configure how the ThreatSpect engine unpacks and scans file archives. The Anti-Virus engine unpacks archives and applies proactive heuristics. If you use this feature, it can have an impact on network performance.