Objects are the elements that enable you to construct, schedule, and search for policy rules, and Security Profiles provide threat protection in policy rules.
This section describes how to configure the Security Profiles and objects that you can use with Policies:
- Move, Clone, Override, or Revert Objects
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Applications
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Tags
- Objects > GlobalProtect > HIP Objects
- Objects > GlobalProtect > HIP Profiles
- Objects > External Dynamic Lists
- Objects > Custom Objects
- Objects > Security Profiles
- Objects > Security Profiles > GTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption Profile
- Objects > Schedules
Objects > GlobalProtect > HIP Objects
Objects > GlobalProtect > HIP Objects Select Objects GlobalProtect HIP Objects to define objects for a host information profile (HIP). HIP objects provide the matching ...
Objects > Security Profiles
Objects > Security Profiles Security profiles provide threat protection in Security Policy. Each Security policy rule can include one or more Security Profiles. The following ...
Provide Granular Access to the Objects Tab
Provide Granular Access to the Objects Tab An object is a container that groups specific policy filter values—such as IP addresses, URLs, applications, or services—for ...
Objects > GlobalProtect > HIP Profiles
Objects > GlobalProtect > HIP Profiles Select Objects GlobalProtect HIP Profiles to create the HIP profiles—a collection of HIP objects to be evaluated together either ...
Policy Policies allow you to enforce rules and take action. The different types of policy rules that you can create on the firewall are: Security, ...
How Does the Gateway Use the Host Information to Enforce Policy?
How Does the Gateway Use the Host Information to Enforce Policy? While the agent gets the information about what information to collect from the client ...
Device Group Objects
Device Group Objects Objects are configuration elements that policy rules reference, for example: IP addresses, URL categories, security profiles, users, services, and applications. Rules of ...
Objects > Security Profile Groups
Objects > Security Profile Groups The firewall supports the ability to create Security Profile groups , which specify sets of Security Profiles that can be ...
Create Objects for Use in Shared or Device Group Policy
Create Objects for Use in Shared or Device Group Policy You can use an object in any policy rule that is in the Shared location, ...