Web Threat Protection settings

You can perform the following actions for configuration of the Web Threat Protection component:

In this section:

Changing the web traffic security level

Changing the action to take on malicious web traffic objects

Web Threat Protection scanning of links to check them against databases of phishing and malicious web addresses

Using heuristic analysis in the operation of the Web Threat Protection component

Editing the list of trusted web addresses

Page top