In the command line, you can manage Network Threat Protection using the Network Threat Protection predefined task (Network_Threat_Protection).
By default, the Network Threat Protection task does not run. You can start and stop the task manually.
You can configure Network Threat Protection settings by editing the settings of the Network Threat Protection predefined task.
Network Threat Protection task settings
Setting |
Description |
Values |
---|---|---|
|
Actions performed upon detection of network activity that is typical of network attacks. Changing the value of this setting from |
|
|
Blocking network activity from attacking devices. |
|
|
Specifies how long attacking devices will be blocked (in minutes). |
1 – 32768 Default value: 60. |
|
The usage of a list of IP addresses whose network activity will not be blocked when a network attack is detected. The application will only log information about dangerous activity from these devices. You can add IP addresses to the exclusion list by using the |
|
|
Specifies an IP address whose network activity will not be blocked by the application. By default, the list is empty. |
The default value is not defined. |