The unit follows-up operating the networking devices and applies the settings and polices via:
1. Operating and analyzing the policies and monitoring the threats via Fort iGATE UTM
2. Monitoring and analyzing threats via ISS
3. Monitoring and analyzing threats via Site Protector application
4. Analyzing and following-up the reports of monitoring threats via FortiAnalyzer
5. Following-up downloading anti-virus programs on the PCs and servers