Configuring Threat Extraction And Threat Emulation Rules - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Configuring Threat Extraction and Threat Emulation Rules

Configuring Threat Extraction and Threat
Emulation Rules
For each Action in a rule, select an option, which defines the Action behavior. You can select a
predefined Action option or select New to define a custom Action option.
Right-click an Action and select Edit or Edit Shared Action to change the Action behavior.
Changes to policy rules are enforced only after you install the policy.
R81 Harmony Endpoint Server Administration Guide      |      338

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Table of Contents

Save PDF