Allows users to configure access control policies based on threat intelligence address books to improve protection effects.
Content
1. Protocols can be specified when users create access control policies that reference threat intelligence address books.
2. Threat intelligence address books support various threat intelligence, including malicious domain names in DNSlog attacks, other malicious domain names, common online document websites, common social websites, and common disk websites. The threat intelligence address books are automatically updated.