Manage threat protection profiles to scan web traffic for threats and apply them to secure access rules for enhanced protection.
The internet access service provides threat protection profiles to secure your files by protecting them from emerging advanced threats. It also integrates with Trend Micro Web Reputation Services to prevent you from accessing infected websites, and provides Advanced Threat Scanning that leverages Predictive Machine Learning, cloud-based sandbox analysis and Threat Intelligence to detect botnets, unknown threats, and suspicious objects.
Threat protection profiles can be applied to the following:
Internet access rules
The following table outlines the actions available on the Threat Protection Profiles tab.
Action |
Description |
---|---|
Add a Threat Protection profile |
|
Check threat protection profile details |
View the basic information about a threat protection profile, including the number of rules that are using the profile. |
Configure a threat protection profile |
Click Click Click To delete more than one threat protection profile, select the profiles and click Delete in the upper left. Note:
Only the threat protection profile that is not in use by any secure access rule can be deleted. |