EasyManua.ls Logo

Check Point 730 - Configuring Threat Prevention; Cyber Threats

Check Point 730
134 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
105
CHAPTER 5
Configuring Threat
Prevention
In This Section:
Cyber Threats .................................................................................................................. 105
Enabling/Disabling Threat Prevention Control..................................................... 106
IPS Security Levels ........................................................................................................ 108
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy .................... 108
Scheduling Blade Updates .......................................................................................... 110
Configuring the Anti-Spam Blade ............................................................................. 110
Configuring the Anti-Spam Policy ............................................................................. 111
Configuring Anti-Spam Exceptions........................................................................... 112
Configuring Anti-Spam to Detect-Only Mode ........................................................ 113
Cyber Threats
Malware is a major threat to network operations that is
increasingly dangerous and sophisticated. Examples include
worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and Trojans.
To challenge today's malware landscape, Check Point's
comprehensive Threat Prevention solution offers a
multi-layered, pre- and post-infection defense approach and a
consolidated platform that enables enterprise security to deal
with modern malware.

Table of Contents

Related product manuals