To access this page, click Configure>Threat Prevention > Policy.
You can create threat prevention policies from the policy page.
Note: If you are creating policies for the first time, you are given the option of setting up Policy Enforcer with Sky ATP or configuring Sky ATP alone. Clicking either button takes you to quick setup for your selection. See Comparing the SDSN and non-SDSN Configuration Steps for a configuration comparison.
To create a threat prevention policy:
Table 203: Fields on the Threat Prevention Policy Page
Field | Description |
---|---|
Name | Enter a unique string that must begin with an alphanumeric character and can include underscores; no spaces allowed; 63-character maximum. |
Description | Enter a description; maximum length is 1024 characters. You should make this description as useful as possible for all administrators. |
Profiles | |
Command and Control Server | Select and choose settings for command and control servers. A C&C is a centralized computer that issues commands to botnets (compromised networks of computers) and receives reports back from them. Botnets can be used to gather sensitive information, such as account numbers or credit card information, or to participate in a distributed denial-of-service (DDoS) attack. |
Include C& C profile in policy | Select the check box to include management for this threat type in the policy. |
Threat Score | Use the slider to change the action to be taken based on the threat score. Threat scores are assigned using several criteria. Refer to the monitoring pages in the UI to investigate, located under Monitor > Threat Management. |
Actions | If the threat score is high enough to cause a connection to be blocked, you have following configurable options:
|
Infected Host | Infected hosts are systems for which there is a high confidence that attackers have gained unauthorized access. Infected hosts data feeds are listed with the IP address or IP subnet of the host, along with a threat score. |
Include infected host profile in policy | Select the check box to include management for this threat type in the policy. Note: If you want to enforce an infected host policy within the network, you must include a switch in the site. |
Actions | You have following options:
|
Malware (HTTP file download and SMTP File attachment) | Malware is files that are downloaded by hosts or received as email attachments and found to be suspicious based on known signatures, URLs. or other heuristics. |
Include malware profile in policy | Select the check box to include management for this threat type in the policy. |
HTTP file download | Turn this feature on to scan files downloaded over HTTP and then select a file scanning device profile already configured through Sky ATP. |
Scan HTTPS | Turn this feature to scan encrypted files downloaded over HTTPS. |
Device Profile | Select a Sky ATP device profile. This is configured through Sky ATP. Sky ATP profiles let you define which files to send to the cloud for inspection. You can group types of files to be scanned together under a common name and create multiple profiles based on the content you want scanned.Device Profiles Overview. |
Threat Score | Use the slider to change the action to be taken based on the threat score. Threat scores are assigned using several criteria. (Note: There is no monitoring setting for malware.) Refer to the monitoring pages in the UI to investigate, located under Monitor > Threat Management. |
Actions | If the threat score is high enough to cause a connection to be blocked, you have following configurable options:
|
SMTP File Attachment | Turn this feature on inspect files received as email attachments (over SMTP only). |
Device Profile | If you do not click the Change button to select a device profile for SMTP scanning, the device profile selected for HTTP will be used by default. Select Change to use a different device profile for SMTP. Device profile are configured through Sky ATP and define which files to send to the cloud for inspection |
Threat Score | Use the slider to change the action to be taken based on the threat score. Threat scores are assigned using several criteria. |
Actions | Actions for SMTP File Attachment include: Quarantine, Deliver malicious messages with warning headers added, and Permit. This actions are set in Sky ATP. |
Log Setting (Policy setting for all profiles) | Select the log setting for the policy. You can log all traffic, log only blocked traffic, or log no traffic. |
Once you have a threat prevention policy, you assign one or more groups to it: