Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Create and Manage Metadata Streaming Profiles to Detect all HTTP Threats

Create Metadata Streaming Profiles

  1. In the Metadata Streaming Profiles section, click the plus icon (Blue plus symbol suggesting an action like adding or expanding content.).
    The Create Metadata Streaming Profile page is displayed.
  2. Enter a unique profile name within 63 alphanumeric characters. You can use special characters such as _ and -.
  3. In the HTTP section, enable the All toggle button. When you enable this option, you cannot configure detection of command-and-control (C2) communications.
    Note:

    When you enable the toggle button, the option to configure settings for command-and-control (C2) communications are hidden.

  4. Select how you want to log a request:
    • Log detections—Log the request only if a threat is detected.

    • Log everything—Log all requests received by the device.

  5. Click OK.
    The metadata streaming profile is created and displayed on the Metadata Streaming Policy page.

Manage Metadata Streaming Profiles

  • Edit—Select the profile, and then click the pencil icon (Blue pencil icon indicating edit functionality.).

  • Clone—Select the profile, and then click More > Clone.

    Note:

    By default, the profile name is suffixed with _copy_1.

  • Delete—Select the profile, and then click the trash can icon (Blue trash can icon representing delete or remove function.).