5. Use Cases

Here you can find some use cases and they are explained step-by-step how to achieve the requirement.

Correlation Scenario "Block TCP Port Scanner"
Path: Policy - Advanced Correlation Summary Imagine you want to block port scanners by dropping their connection attempts. As a kind of reconnaissance pr...
Thu, 14 Nov, 2019 at 5:08 PM
Setting up Schedules for Rule Application
Path: Policy - Schedules With cognitix Threat Defender you can set up custom time schedules to specify at what dates and times rules are applied to the ne...
Mon, 14 Oct, 2019 at 10:51 AM
Allowing Internet Traffic via Internal Proxy Server Only
Path: Policy - Network Objects - Static Network Objects Path: Policy - Rules In a company there is a proxy server with detailed URL-based rule sets. Ther...
Mon, 16 Dec, 2019 at 2:47 PM
Allowing YouTube Usage for 5 Minutes per Hour
You can set up Threat Defender to restrict access to certain websites for a certain time. This example shows how to use the following concepts: Correlati...
Mon, 16 Dec, 2019 at 2:51 PM