5. Use Cases

Here you can find some use cases and they are explained step-by-step how to achieve the requirement.

Correlation Scenario "Block TCP Port Scanner"
path: Policy - Advanced Correlation Summary Imagine you want to block port scanners by dropping their connection attempts. As a kind of Reconnaissance P...
Fri, 22 Sep, 2017 at 6:46 PM
Block Document Uploads Based on File Extension
Path: Security - Data Leakage Prevention Profile Using a Data Leakage Prevention Profile (DLP) you can avoid a transmission of dedicated documents based o...
Wed, 4 Oct, 2017 at 10:28 AM
Allow Connections During the Business Hours
Path: Policy - Schedule With the cognitix Threat Defender you can steer your data flow based on period validity (timeframe, weekdays, hours) and repeats a...
Tue, 26 Sep, 2017 at 7:39 AM
Allow Internet Traffic via Internal Proxy Server Only
Path: Policy - Network Objects - Static Network Object Path: Policy - Rules Situation You have an already configured company proxy server with detailed ...
Tue, 26 Sep, 2017 at 2:59 PM
Allow YouTube Usage for 5 Mins per Hour Within The Business Hours
This is a special situation but can be solved via another but more complex Advanced Correlation Scenario. Goals allow all users to use YouTube connec...
Wed, 27 Sep, 2017 at 4:43 PM