You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Threat intelligence can be configured in the following modes. By default, threat intelligence-based filtering is enabled in alert mode.
21
22
22
-
You can choose to log only an alert when a rule is triggered, or you can choose alert and deny mode.
23
+
Mode |Description |
24
+
|---------|---------|
25
+
|`Off`| The Threat Intelligence feature will not be enabled for your firewall |
26
+
|`Alert only`| You will receive high confidence alerts for traffic going through your firewall to or from known malicious IP addresses and domains |
27
+
|`Alert and deny`| Traffic will be blocked and you will receive high confidence alerts when traffic attempting to go through your firewall to or from known malicious IP addresses and domains is detected. |
28
+
29
+
> [!NOTE]
30
+
> Threat intelligence mode is inherited from parent policies to child policies. A child policy must be configured with the same or stricter mode than the parent policy.
23
31
24
-
By default, threat intelligence-based filtering is enabled in alert mode.
25
32
26
33
## Allowed list addresses
27
34
28
-
You can configure a list of allowed IP addresses so that threat intelligence won't filter any of the addresses, ranges, or subnets that you specify.
35
+
Threat intelligence may trigger false positives and block traffic that actually is valid. You can configure a list of allowed IP addresses so that threat intelligence won't filter any of the addresses, ranges, or subnets that you specify.
36
+
37
+

29
38
39
+
The allow list can be updated with multiple entries at the same time by uploading a CSV file. The CSV can only contain IP Addresses and ranges, no headings are allowed.
30
40
41
+
> [!NOTE]
42
+
> Threat intelligence allow list addresses are inherited from parent policies to child policies. Any IP address or range added to a parent policy will apply for all child policies as well.
31
43
32
44
## Logs
33
45
34
-
The following log excerpt shows a triggered rule:
46
+
The following log excerpt shows a triggered rule for outbound traffic to a malicious site:
0 commit comments