- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
on 11-14-2019 10:48 AM - edited on 07-07-2020 03:58 PM by DawgsFan
This video explains the best practices for creating Log Forwarding profiles and the importance of properly inspecting Threat Settings.
Threat logs display entries when traffic matches one of the Security profiles attached to a Security rule on the firewall. The entry includes information on the type of threat, the threat description or URL, destination zone, severity level, and more. The Threat Settings best practice check ensures ensures that log forwarding for threat logs is configured.
For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.