Attaching a Vulnerability Protection (VP) Profile to all security rules protects against buffer overflows, illegal code execution, and other attempts to exploit client-side or software vulnerabilities.
Learn about the best practice configuration for inbound VP, internal VP, and outbound VP. We also demonstrate how you can configure an alert only (VP) profile.