Next, you attach the UTM policy to a security policy that you create.
This takes you to the policy configuration pop-up window.
Do this by selecting junos-<protocol> (for all protocols that support antivirus scanning) in the Application Sets box and clicking the right arrow —> button to move them to the Matched box.
Note: When you select Permit for Policy Action, several additional fields become available in the Applications Services tab, including UTM Policy.
This attaches your UTM policy to the security policy.
Note: There are several fields on this page that are not described in this section. See the Security Policies section for detailed information on configuring security policies and all the available fields.
You must activate your new policy to apply it.