The Emerging Threats page provides up-to-date information on ongoing threats to your
environment.
Security vulnerabilities, such as the Log4J
exploit, are listed along with Network Security best practices you should
take to protect your environment.
The page further specifies:
- Whether the protection options are optional, recommended, or required.
- The current status of your network policy against the threat.
- A specific action that you can click to protect your environment.
From the navigation panel, click the Policy icon
and select Emerging Threats.