Threat Settings BPA Checks

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.
Retired Member
Not applicable
No ratings

Log Forwarding - Threat Settings - Interpreting BPA Checks - Objects


This video explains the best practices for creating Log Forwarding profiles and the importance of properly inspecting Threat Settings.


Threat logs display entries when traffic matches one of the Security profiles attached to a Security rule on the firewall. The entry includes information on the type of threat, the threat description or URL, destination zone, severity level, and more. The Threat Settings best practice check ensures ensures that log forwarding for threat logs is configured.


For additional resources regarding BPA, visit our LIVEcommunity BPA tool page.
View videos regarding BPA Network best practice checks.
View videos regarding BPA Policies best practice checks.
View videos regarding BPA Objects best practice checks.
View videos regarding BPA Devices best practice checks.
You may also view other BPA video playlist on the LIVEcommunity YouTube channel.

Rate this article:
Register or Sign-in
Article Dashboard
Version history
Last Updated:
‎07-07-2020 03:58 PM
Updated by: