Configure File Policies
Before you begin
Complete the tasks up to this point in the malware protection workflow:
Procedure
Step 1 | Review file policy and file rule restrictions. See Best Practices for File Policies and Malware Detection and subtopics. |
Step 2 | Create a file policy. |
Step 3 | Create rules within your file policy. See File Rules and subtopics. |
Step 4 | Configure advanced options. |
What to do next
Continue with the next step in the malware protection workflow: