CHAPTER 5
Configuring Threat
Prevention
In This Section:
Cyber Threats .................................................................................................................. 105
Enabling/Disabling Threat Prevention Control..................................................... 106
IPS Security Levels ........................................................................................................ 108
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy .................... 108
Scheduling Blade Updates .......................................................................................... 110
Configuring the Anti-Spam Blade ............................................................................. 110
Configuring the Anti-Spam Policy ............................................................................. 111
Configuring Anti-Spam Exceptions........................................................................... 112
Configuring Anti-Spam to Detect-Only Mode ........................................................ 113
Cyber Threats
Malware is a major threat to network operations that is
increasingly dangerous and sophisticated. Examples include
worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and Trojans.
To challenge today's malware landscape, Check Point's
comprehensive Threat Prevention solution offers a
multi-layered, pre- and post-infection defense approach and a
consolidated platform that enables enterprise security to deal
with modern malware.