![]() |
![]() |
![]() |
![]() |
Internet Usage Filters > Managing access to categories, protocols, and cloud apps > Security protocol groups
|
![]() |
The Malicious Traffic protocol group includes the Bot Networks protocol, aimed at blocking command-and-control traffic generated by a bot attempting to connect with a botnet for malicious purposes.
|
![]() |
The Malicious Traffic (Cannot block) protocol group is used to identify traffic that may be associated with malicious software.
|
![]() |
Email-Borne Worms tracks outbound SMTP traffic that may be generated by an email-based worm attack.
|
![]() |
Other tracks inbound and outbound traffic suspected of connection with malicious applications.
|
![]() |
![]() |
![]() |
![]() |
Internet Usage Filters > Managing access to categories, protocols, and cloud apps > Security protocol groups
|