Advanced Protection
In this chapter, we will learn about advanced configuration features, such as custom applications and custom threats, and apply them to a policy. We will also learn how to create our own threat signatures so we can block certain payloads, and we will review how zone protection and Denial-of-Service (DoS) protection can defend the network and individual resources from attackers.
In this chapter, we’re going to cover the following main topics:
- Creating custom applications and application overrides
- Creating custom threat signatures
- Implementing zone protection and DoS protection