To provide updated malicious data signatures to all Threat Prevention blades, the Threat Prevention gateway does what with the data?
Which policy type is used to enforce bandwidth and traffic control rules?
When a SAM rule is required on Security Gateway to quickly block suspicious connections which are not restricted by the Security Policy, what actions does the administrator need to take?
Fill in the blank: An Endpoint identity agent uses a _____ for user authentication.
Fill in the blanks: The _______ collects logs and sends them to the _______.
When enabling tracking on a rule, what is the default option?