|
Built-in Best Practice Rules
To ensure that your network is as secure as possible, enable your
users and applications based on best practice templates. With
best practices as your basis, you can then refine policy based
on your enterprise needs.
|
√
Features with best practice rules include:
Security rules Security profiles - Decryption
M365
|