You are here: Webhelp > Threat Prevention > Mitigation


This feature may not be available on all platforms. Please check your system's actual page if your device delivers this feature.

The system can identify the potential risks and network attacks dynamically, and take action on the risk that hits the mitigation rules.

Mitigation Rule

Mitigation rules includes the following two types:

  • Predefined rule: This rule is retrieved from the Mitigation rule database. The predefined rules may vary by different mitigation signature databases. For more information about updating the signature database, see Upgrading System
  • User-defined rule: According to the user's needs, specify the trigger condition and action. For more information, see Configuring a User-defined_Mitigation Rules.
  • Mitigation rules only for the threat types of Scan, Dos and Spam.
  • Predefined rule can not be edited or deleted.

Configuring a User-defined Mitigation Rule

To configure a user-defined mitigation rule, take the following steps:

  1. Click iCenter > Mitigation > Mitigation Rule.
  2. Click New.
  3. Click OK.

Enabling Mitigation

After enabling mitigation , mitigation rules (user-defined rule and predefined rule) will take effect.

To enable the mitigation, take the following steps:

  1. Click iCenter > Mitigation>Mitigation Rule.
  2. Click the Enable Mitigation button.

Viewing Mitigation Action

To view the mitigation action results details of mitigation rules, take the following steps:

  1. Click iCenter > Mitigation>Mitigation Action.
  2. As necessary, you can click Filter to view the mitigation action details of specified conditions.
Support for fuzzy search, but dose not support IP address search in accordance with the IP address containing mask.