You have configured a UTM feature profile.
Which two additional configuration steps are required for your UTM feature profile to take effect? (Choose two.)
For the UTM feature profile to take effect, it must be associated with a security policy and a UTM policy. The security policy defines the traffic flow and the actions that should be taken on the traffic, while the UTM policy defines the security features to be applied to the traffic, such as antivirus, intrusion prevention, and web filtering. The UTM feature profile provides the necessary configuration for the security features defined in the UTM policy.
Lucina
29 days agoMinna
10 days agoAaron
17 days agoJerry
1 months agoKenia
2 days agoLenita
8 days agoMilly
1 months agoPearlene
23 days agoWhitney
26 days agoGoldie
1 months agoMarcos
2 months agoLevi
2 months agoAlfreda
2 months agoQuentin
19 days agoJanae
22 days agoMari
1 months agoTerrilyn
2 months agoMarcos
2 months agoSheron
3 months agoAlline
1 months agoAmber
2 months agoGoldie
2 months ago