TMS zl Module Planning and Implementation Guide 2009-08

Table Of Contents
Page 87
Let’s enable threat detection and use the default actions be sure to click Apply. Notice
the settings: For Critical threats, the IPS will terminate the session where the critical
threat was recognized. For others, it will block traffic, and others, it will simply log and
allow the traffic to pass.
We like more security, so let’s sacrifice a little performance to get more security by
checking the full session inspection check box – Click Apply My Changes.