Objects > Security Profile Groups
The firewall supports the ability to create Security Profile groups, which specify sets of Security Profiles that can be treated as a unit and then added to security policies. For example, you can create a threats Security Profile group that includes profiles for Antivirus, Anti-Spyware, and Vulnerability Protection and then create a Security policy rule that includes the threats profile.
Antivirus, Anti-Spyware, Vulnerability Protection, URL filtering, and file blocking profiles that are often assigned together can be combined into profile groups to simplify the creation of security policies.
To define a new Security Profile, select ObjectsSecurity Profiles.
The following table describes the Security Profile settings:
Security Profile Group Settings
Enter the profile group name (up to 31 characters). This name appears in the profiles list when defining security policies. The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
Select this option if you want the profile group to be available to:
Disable override (Panorama only)
Select this option to prevent administrators from overriding the settings of this Security Profile group object in device groups that inherit the object. This selection is cleared by default, which means administrators can override the settings for any device group that inherits the object.
Select an Antivirus, Anti-Spyware, Vulnerability Protection, URL filtering, and/or file blocking profile to be included in this group. Data filtering profiles can also be specified in Security Profile groups. Refer to Objects > Security Profiles > Data Filtering.
URL Filtering General Settings
URL Filtering General Settings The following table describes the general URL filtering settings. General Settings Description Name Enter a profile name (up to 31 characters). ...
Objects > Security Profiles > File Blocking
Objects > Security Profiles > File Blocking You can attach a File Blocking profile to a Security policy rule ( Policies > Security ) to ...
Objects > GlobalProtect > HIP Profiles
Objects > GlobalProtect > HIP Profiles Select Objects GlobalProtect HIP Profiles to create the HIP profiles—a collection of HIP objects to be evaluated together either ...
Overriding or Reverting a Security Policy Rule
Overriding or Reverting a Security Policy Rule The default security rules—interzone-default and intrazone-default—have predefined settings that you can override on a firewall or on Panorama. ...
Apply Policies to the VM-Series Firewall
Apply Security Policies to the VM-Series Firewall Now that you have created the steering rules on Panorama and pushed them to the NSX Manager, you ...
Objects > Security Profiles
Objects > Security Profiles Security profiles provide threat protection in Security Policy. Each Security policy rule can include one or more Security Profiles. The following ...
Objects > Security Profiles > Data Filtering
Objects > Security Profiles > Data Filtering Data filtering enables the firewall to detect sensitive information—such as credit card or social security numbers or internal ...
Objects > Security Profiles > Vulnerability Protection
Objects > Security Profiles > Vulnerability Protection A Security policy rule can include specification of a Vulnerability Protection profile that determines the level of protection ...
Decryption Profile General Settings
Decryption Profile General Settings The following table describes the general settings for decryption profiles. Decryption Profile — General Settings Description Name Enter a profile name ...