ZyWALL ATP Series User’s Guide
554
C
HAPTER
31
Sandboxing
31.1 Overview
The Zyxel Device sandboxing is a security mechanism, which provides a safe environment to separate
running programs from your network and host devices. Unknown or untrusted programs/codes are
executed within an isolated virtual machine (VM) to monitor and analyze the zero-day malware and
advanced persistent threats (APTs) that may evade the Zyxel Device protection, such as anti-malware.
When a file with malicious or suspicious codes is detected, the Zyxel Device can take specific actions on
the threats.
31.1.1 What You Can Do in this Chapter
Use the
Sandboxing
screen (
) to turn sandboxing on or off, and specify the
actions the Zyxel Device takes when malicious or suspicious files are detected.
31.2 Sandboxing Screen
Click
Configuration > Security Service
>
Sandboxing
to display the configuration screen as shown next.
Use this screen to enable sandboxing, and specify the actions the Zyxel Device takes when malicious or
suspicious files are detected.
Figure 361
Configuration > Security Service > Sandboxing