Threat Settings BPA Checks

Announcements

Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.

Printer Friendly Page
Retired Member
Did you find this article helpful? Yes No
No ratings

Log Forwarding - Threat Settings - Interpreting BPA Checks - Objects

 

This video explains the best practices for creating Log Forwarding profiles and the importance of properly inspecting Threat Settings.

 

Threat logs display entries when traffic matches one of the Security profiles attached to a Security rule on the firewall. The entry includes information on the type of threat, the threat description or URL, destination zone, severity level, and more. The Threat Settings best practice check ensures ensures that log forwarding for threat logs is configured.

 

For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.

Register or Sign-in
Version history
Last update:
‎07-07-2020 03:58 PM
Updated by:
Contributors