5. Use Cases

Here you can find some use cases and they are explained step-by-step how to achieve the requirement.

Correlation Scenario "Block TCP Port Scanner"
Path: Policy - Advanced Correlation Summary Imagine you want to block port scanners by dropping their connection attempts. As a kind of reconnaissance pr...
Thu, 14 Nov, 2019 at 5:08 PM
Allowing Internet Traffic via Internal Proxy Server Only
Path: Policy - Network Objects - Static Network Objects Path: Policy - Rules In a company there is a proxy server with detailed URL-based rule sets. Ther...
Thu, 6 Feb, 2020 at 11:47 AM
Allowing YouTube Usage for 5 Minutes per Hour
You can set up Threat Defender to restrict access to certain websites for a certain time. This example shows how to use the following concepts: Correlati...
Mon, 16 Dec, 2019 at 2:51 PM