Print Download Documentation Send Feedback

Previous

Next

UserCheck Custom Frequency

What can I do here?

Use this window to set the number of times that users get UserCheck messages for accessing applications that are not permitted by the policy.

Getting Here

Getting Here - Security Policies > Threat Prevention > Policy > Threat Tools > Profiles > Profile > Anti-Bot / Anti-Virus > UserCheck Settings > Show: Custom Frequency > Configure

Configuring Anti-Virus Settings

You can configure Threat Prevention to exclude files from inspection, such as internal emails and internal file transfers. These settings are based on the interface type (internal or external, as defined in SmartConsole) and traffic direction (incoming or outgoing).

Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly.

Do this procedure for each interface that goes to the DMZ.

You can configure the Anti-Virus profile to enable archive scanning. The Anti-Virus engine unpacks archives and applies proactive heuristics. If you use this feature, it can have an impact on network performance.

Note - The MIME Nesting settings are the same for Anti-Virus and Threat Emulation.

Anti-Virus Settings of the Threat Prevention Profile

UserCheck Messages

Select the UserCheck Messages options:

Protected Scope

Protocol

Select the protocols that Anti-Virus scans:

File Types

Select the File Types that Anti-Virus scans:

Archives

Configure how the ThreatSpect engine unpacks and scans file archives. The Anti-Virus engine unpacks archives and applies proactive heuristics. If you use this feature, it can have an impact on network performance.