Configure Protection
Use the API to configure the protection of your assets:
- Create and Configure a Policy
- Configure Firewall
- Configure Intrusion Prevention
- Configure Anti-Malware
- Configure Web Reputation
- Configure Application Control
- Configure Integrity Monitoring
- Configure Log Inspection
- Configure Device Control
- Create and Modify Lists
- Create and Configure Schedules
- Configure Computers to Override Policies