Set Up Security Profiles and Policies
The following sections provide basic threat prevention configuration examples:
For information on controlling web access as part of your threat prevention strategy, see URL Filtering.

Related Documentation