Add File Policies to Your Access Control Configuration

An access control policy can have multiple access control rules associated with file policies. You can configure file inspection for any Allow or Interactive Block access control rule, which permits you to match different file and malware inspection profiles against different types of traffic on your network before it reaches its final destination.

Before you begin

Complete the tasks up to this point in the malware protection workflow:

See How to Configure Malware Protection.

Procedure


Step 1

Review guidelines for file policies in access control policies. (These are different from the file rule and file policy guidelines that you looked at previously.)

Step 2

Associate the file policy with an access control policy.

Step 3

Assign the access control policy to managed devices.


What to do next

Continue with the next step in the malware protection workflow:

See How to Configure Malware Protection.