Settings
Configure system settings and set up Notification, Backup and Restore, as well as Log Storage to better suit your network environment.
To enable Threat Prevention:
- Go to Settings > General and tick Enable Threat Prevention to protect your system form attacks.
- Tick the check box to set Automatically drop high-risk packets as the default action.
- Click Apply to save changes.
Note:
- Threat Prevention only uses an Intrusion prevention system (IPS). Intrusion detection system (IDS) functions are no longer available.
- Self-defined policies are given the highest priority. If you set not to drop high-risk packets in Self-Defined Policy, high-risk packets will not be dropped even if you tick the Automatically drop high-risk packets checkbox.
To determine which interfaces to monitor:
- Go to Settings > General and find the status of each interface.
- Tick/untick checkboxes to determine which interfaces to monitor.
- Click Apply to save changes.
To monitor updates:
- Go to Settings > General and view the overall status of system updates.
- You can perform the following actions:
- Click Update Now to update immediately if an update is available.
- Tick Automatically update signatures to allow auto updates, and set the Schedule by choosing the date and time form the drop-down menus.
- Select an Update Source (ET open or ET pro) form the drop-down menu.
- Click Apply to save changes.
To enable event notification:
- Go to Settings > Notification and tick Enable event notification.
- Select the notification medium (E-mail, SMS, Push Service) and set the minimum time interval.
- Click Advanced to further determine how to receive notifications of each event, and click OK.
- Click Apply to save changes.
To back up or restore settings:
- Go to Settings > Backup and Restore.
- Click Backup to save the current settings to your computer.
- Click Restore and select a (.dss) file to restore settings.
- Click Apply to save changes.
To limit log storage:
- Go to Settings > Log Storage.
- Set the Maximum log usage (500MB, 1GB, 2G). Once the storage threshold is exceeded, the system will automatically rotate older log files.
- To erase all existing logs, click Clear Logs.
- Click Apply to save changes.