Network Threat Protection settings

You can perform the following actions for configuring Network Threat Protection settings:

In this section:

Editing the settings used in blocking an attacking computer

Configuring addresses of exclusions from blocking

Changing the mode of protection against MAC spoofing attacks

Page top