Customize risk and compliance management
Note: For information on how to customize the network topology and/or specify traffic that should always be treated as non-threatening, see Customize risk detection.
For details, see:
-
Create custom risk profiles with built-in and custom risk items. For details, see:
-
Define new zone types, in addition to the predefined Internal, External, and DMZ. For details, see Customize zone types.
-
Add new host group definitions. For details, see Customize hostgroups.
-
Add new service definitions. For details, see Customize services.
-
Configure AFA to treat private IP addresses as non-threatening. For details, see Configure trusted private IP addressses.
-
Customize the security rating and the way security rating information is displayed. For details, see Configure security ratings.
-
Configure which regulatory compliance standards are relevant to your environment. For details, see Customize the regulatory compliance report.
-
Customize the configuration requirements for baseline compliance. For details, see Customize baseline configuration profiles.