This section includes the following examples:
Content disarm and reconstruction
FortiGuard outbreak prevention
External malware block list
Exempt list for files based on individual hash