Cloud Firewall - Threat Intelligence-based Access Control Policies Are Optimized
Feb 20 2024
Cloud FirewallContent
1. Protocols can be specified when users create access control policies that reference threat intelligence address books. 2. Threat intelligence address books support various threat intelligence, including malicious domain names in DNSlog attacks, other malicious domain names, common online document websites, common social websites, and common disk websites. The threat intelligence address books are automatically updated.