Manage threat protection rules to scan web traffic for threats and apply them to secure access rules for enhanced protection.
The internet access service provides threat protection rules to secure your files by protecting them from emerging advanced threats. It also integrates with Trend Micro Web Reputation Services to prevent you from accessing infected websites, and provides Advanced Threat Scanning that leverages Predictive Machine Learning and Threat Intelligence to detect botnets, unknown threats, and suspicious objects.
Threat protection rules can be applied to the following:
Internet access rules
The following table outlines the actions available on the Threat Protection tab (Zero Trust Secure Access > Secure Access Resources > Threat Protection).
Action |
Description |
---|---|
Add a threat protection rule |
|
Check threat protection rule details |
View the basic information about a threat protection rule, including the number of rules that are using the rule. |
Configure a threat protection rule |
Click Click Click To delete more than one threat protection rule, select the rules and click Delete in the upper left. Note:
Only the threat protection rule that is not in use by any secure access rule can be deleted. |