All Products
Search
Document Center

Cloud Firewall:Threat Intelligence-based Access Control Policies Are Optimized

Last Updated:Dec 02, 2024

Allows users to configure access control policies based on threat intelligence address books to improve protection effects.

Content

1. Protocols can be specified when users create access control policies that reference threat intelligence address books.
2. Threat intelligence address books support various threat intelligence, including malicious domain names in DNSlog attacks, other malicious domain names, common online document websites, common social websites, and common disk websites. The threat intelligence address books are automatically updated.