Support Center > Search Results > SecureKnowledge Details
How to configure User Authentication proxy in Threat Emulation Technical Level
  • Threat Emulation files (such as detection rules, images, engine update) cannot be downloaded.

  • Connectivity issues when using Threat Emulation on cloud.

An authenticated proxy is defined. User must configure the credentials (user/password) using GuiDBEdit Tool.

Note: To view this solution you need to Sign In .