EasyManua.ls Logo

Check Point 730 - Page 100

Check Point 730
134 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
100
Configure one or more of these options:
Block security risk categories - Block applications and
URLs that may be security risks:
Spyware
Phishing
Botnet
Spam
Anonymizer
Hacking
This option is selected by default.
Block inappropriate content - Block access to websites
with inappropriate content like pornography, violence,
gambling and alcohol.
Block file sharing applications - Block file-sharing from
sources that use torrents and peer-to-peer (P2P)
applications.
Block other undesired applications - Block specified
applications or URLs. Click this option to manage your
basic Application and URL Filtering policy.
Limit bandwidth-consuming applications - Limit or block
applications that take up a lot of bandwidth. P2P file
sharing, media sharing and media streams are selected by
default. You can edit the group to add other applications or
categories.
Note - The maximum bandwidth limit must be lower than
the actual bandwidth provided by your ISP.

Table of Contents

Related product manuals