Autonomous Threat Prevention Profiles

These are the 6 profiles supported by Autonomous Threat Prevention:

  • Recommended for Perimeter Profile

    Optimized security for perimeter gateway to prevent cyberattacks. Includes protection for users browsing the web, data centers, incoming emails, and FTP. This is the default profile and the recommended profile for multiple protections on the same gateway (for example, when both Perimeter protection and Internal network protection are needed).

    Recommended for Perimeter is the most similar profile to the Optimized profile in the Custom Threat Prevention policy.

  • Strict Security for Perimeter Profile

    Maximum security for perimeter gateways to prevent cyberattacks. Includes protection for users browsing the web, data centers, incoming emails and FTP.

  • Cloud/Data Center Profile

    Optimized security to prevent cyberattacks on data centers. Includes extensive protection over servers and east–west traffic.

  • Internal Network Profile

    Maximum security to prevent cyberattacks over internal traffic between internal users and internal servers.

  • Recommended for Guest Network Profile

    DetectClosed UserCheck rule action that allows traffic and files to enter the internal network and logs them. mode” security profile to monitor cyberattacks attempts through a guest network (Wi-Fi) non-intrusively.

  • Monitor Profile

    "Detect mode" security profile to generate logs and reports.

Each profile consists of a wide range of industry-leading protections. This table summarizes the technologies used by each profile:

Profile

IPS Protections

File & URL Reputation

ThreatCloud

Sandbox

Sanitization (CDR)

C&C protection

Zero Phishing

URL-based Zero Phishing

In-browser Zero Phishing

Recommended for Perimeter Profile

Strict Security for Perimeter Profile

Cloud/Data Center Profile

Internal Network Profile

Recommended for Guest Network Profile

Monitor Profile

Here is a short explanation about each technology: