Proxy Settings

Administration > Proxy Settings

Configure Threat Mitigator to use the proxy settings when performing the following:

A brief description of the options on this screen is available below.

If the proxy server requires authentication, specify the following:

See also: