The following sections provide basic threat prevention configuration examples:
For information on controlling web access as part of your threat prevention strategy, see URL Filtering.

Related Documentation