Create and Manage Infected Hosts Profiles
Infected hosts indicate local devices that are potentially compromised because they appear to be part of a C&C network or exhibit other symptoms. Create an Infected Hosts profile to configure feeds and threat score to list the IP address or IP subnet of the compromised host.
Manage Infected Hosts Profiles
-
Edit—Select the profile, and then click
. If the profile is referenced in a firewall policy intent, then the firewall policy is marked for deployment. You must deploy the firewall policy for the changes to take effect on the device.
-
Clone—Select the profile, and then click
. -
Delete—Select the profile, and then click
.