Skip to main content
Threat Protection Docs
Products
Learning
Support
Threat Protection Docs
Discover how to make the most out of Threat Protection's network security solutions
Set up your first proxy
Getting started
Import a custom certificate
Set up a Let's Encrypt certificate
Configure new proxy
Fine tune your protection
How Web Application Firewall (WAF) works
Handling false positives
Rate limiting
Geo-fencing
Leverage our API
Authentication
Create a proxy
Traffic management
Event insights