Security Essentials policies attach curated network threat lists to managed sites. Each list includes operational metadata such as prefix count, BGP community, update interval, and last updated time so you can understand what the policy is doing before you attach it.Documentation Index
Fetch the complete documentation index at: https://altostrat.io/docs/llms.txt
Use this file to discover all available pages before exploring further.
Prerequisites
- You understand which sites should use the policy.
- You can test critical applications after attaching a new policy.
- You have a rollback plan for high-sensitivity environments.
How It Works
Security Essentials policies are made from one or more list categories. SDX keeps the lists updated, and the policy determines which sites receive that protection. List metadata helps you review operational impact.| Field | Why it matters |
|---|---|
| Prefix count | Shows the approximate size of the list. Larger lists can have broader impact. |
| BGP community | Identifies the route community used by the mitigation list. |
| Update interval | Shows how frequently the list is refreshed. |
| Last updated | Helps you verify freshness before rollout. |
Attach a Policy
- Open Policies and select Security Essentials.
- Create or edit a policy.
- Select the list categories that match your risk posture.
- Review prefix count and update metadata for each selected list.
- Attach the policy to a small set of representative sites first.
- Test critical traffic paths.
- Roll out to the remaining sites after validation.
Advanced Rollout Pattern
For production fleets, use a staged rollout.- Attach the policy to a low-risk pilot site.
- Monitor connectivity, support tickets, and Fault Logging.
- Expand to a tagged group of similar sites.
- Keep a stricter policy for higher-risk networks and a conservative policy for sensitive business locations.