How is the Block Intruder request used?
A.
It is used in place of the HTTP Security Server.
B.
SmartDefense automatically uses this capability.
C.
It is used in the Log mode of SmartView Tracker to kill active connections.
D.
It is activated in SmartDashboard through the Security Policy.
E.
It blocks access from a Source, or to a Destination, for a specified amount of time, or
indefinitely.