Configure File Policies
Before you begin
Complete the tasks up to this point in the malware protection workflow:
Procedure
1 |
Review file policy and file rule restrictions. See Best Practices for File Policies and Malware Detection and subtopics. |
2 |
Create a file policy. |
3 |
Create rules within your file policy. See File Rules and subtopics. |
4 |
Configure advanced options. |
What to do next
Continue with the next step in the malware protection workflow: