This section describes how to load and update the botnet, Trojan horse, and worm library file, malicious URL library file, IP reputation library file, and IP location library file.
Before managing library files, configure FTP.
Click
in the Operation column on the right of a device to access the Modify Management Protocol window.
Click the FTP tab to complete the SFTP configuration.
The SFTP user name and password must be pre-set on the device and the same as those configured on the ATIC management center.
The passwords must meet the minimum complexity requirement. That is, the passwords must contain at least three of the following, including upper-case letters (A to Z), lower-case letters (a to z), digits (0 to 9), and special characters (such as !, #, $, and %). You must change the passwords periodically.
| Deploy | Click to deploy
the selected library file to the device. |
| Import |
|
| Export |
|
| Delete |
NOTE:
Only Undeployed library files can
be directly deleted. If a library file has been successfully or partially
deployed, it cannot be deleted. To delete a deployed library file,
load another library file of the same type. The newly loaded library
file overwrites the deployed one and is in Undeployed state. Then, you can delete this file. |
| Synchronize | Click Download the latest library file from the secure cloud center to the ATIC management center. Ensure that the secure cloud center and ATIC management center are reachable. NOTE:
The ATIC management center supports automatic database file synchronization and automatically updates the database file in 4 a.m. every day. After the update is complete, both the new and old database files exist in the database file list. The ATIC supports a maximum of 40 database files. If there are more than 40 database files, the synchronization fails. You need to manually delete old database files. |