This chapter describes how to configure Unified Threat Management (UTM) security services to provide protection from Internet threats. It includes the following sections:
• Activating Security Services
• Priority of Security Services
• Viewing Security Services Reports
• Configuring Application Control
• Configuring Intrusion Prevention
• Configuring Web Reputation Filtering
• Configuring Web URL Filtering
To access the Security Services pages, click Security Services in the left hand navigation pane.