Configuring threat detection and response settings Skip Navigation

Configuring threat detection and response settings

You can configure how
CylanceGATEWAY
detects and reacts to threats in various ways.
You can use intrusion protection to enable deep network threat detection using the network connection’s signatures. When intrusion protection is enabled,
CylanceGATEWAY
automatically blocks connections where threats are detected. Intrusion protection is enabled by default.
You can use destination reputation to enable detection of potentially malicious IP addresses and FQDN destinations. When destination reputation is enabled,
CylanceGATEWAY
automatically blocks the destination when they match the set risk level. Destination reputation is disabled by default.