To identify threats detected by inline cloud analysis, you should filter the Threat logs by Action. This helps in pinpointing the specific actions taken by the firewall in response to detected threats, allowing for a more focused analysis of how threats were handled.
[Reference:, Filtering Threat Logs by Action: "Filter Threat logs by Action" ., , ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit