Purpose: Configure Suspicious Endpoints to bolster your gateway security against emerging threats.
Location: Gateways > (gateway name) > NETWORK ACCESS CONTROL > Suspicious Endpoints > General
Block: All access to the Internet is blocked.
If any endpoint is blocked by the Suspicious Endpoints function, the client browser is sent the Suspicious Endpoints Violation notification page and the incident is logged in the troubleshooting screen.
Monitor (default): Access to the Internet is allowed, but the suspicious endpoint is added to the violation list.
The range is 1 to 1000.
Supported values are 30 minutes, 1 hour, 6 hours, 12 hours, and 1 day.