Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Network Malware Protection and File Policies Network Malware Protection and File Policies How to Configure Malware Protection

Last updated: Jul 29, 2025

How to Configure Malware Protection

This topic summarizes the steps you must take to set up your system to protect your network from malicious software.

Procedure

1

Plan and Prepare for Malware Protection

2

Configure File Policies

3

Add File Policies to Your Access Control Configuration

4

Configure network discovery policies to associate file and malware events with hosts on your network.

(Do not simply turn on network discovery; you must configure it to discover hosts on your network to build a network map of your organization.)

See Network Discovery Policies and subtopics.

5

Deploy policies to managed devices.

6

Test your system to be sure it is processing malicious files as you expect it to.

7

Set Up Maintenance and Monitoring of Malware Protection

What to do next