Which component scans for threats in allowed traffic?
Which component scans for threats in allowed traffic?
Security profiles scan for threats in allowed traffic. They are applied to traffic after it has been allowed by the security policy rule, performing checks for malicious activity or content even in permitted traffic flows.
Security Profiles are not used in the match criteria of a traffic flow. The Security Profile is applied to scan traffic after the application or category is allowed by the Security policy rule.