Vulnerability Protection profiles stop attempts to exploit
system flaws or gain unauthorized access to systems. While Anti-Spyware
profiles help identify infected hosts as traffic leaves the network,
Vulnerability Protection profiles protect against threats entering
the network. For example, Vulnerability Protection profiles help
protect against buffer overflows, illegal code execution, and other
attempts to exploit system vulnerabilities. The default Vulnerability
Protection profile protects clients and servers from all known critical,
high, and medium-severity threats. You can also create exceptions,
which allow you to change the response to a specific signature.
To configure how the firewall responds to a threat, see Anti-Spyware Profiles for
a list of supported actions.