Understanding and preparing security profiles
There are several types of security profiles, like Antivirus, Vulnerability Protection, URL Filtering, and Anti-Spyware. We’ll cover all of these different profiles in the following sections.
Before you can start building a solid security rule base, you need to create at least one custom security profile of each type to use in all of your security rules. There are default profiles available, but these are set to read-only, which means that if you start using them in security rules, you’ll need to replace them one by one if you create custom ones later.
Security profiles are evaluated by the first security rule that a session is matched against. If a six-tuple is matched against a security rule with no or limited security profiles, no scanning can take place until there is an application shift and the security policy is re-evaluated. All security rules need to have security profiles.