EasyManua.ls Logo

Check Point 770 - Access Policy; Threat Prevention

Check Point 770
112 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
48
Access Policy
The Access Policy has these features:
Firewall - Makes sure that only allowed traffic enters the
company's network. Other traffic is blocked before it
enters.
Application Control and URL Filtering - Makes sure that
only authorized applications are used on the network and
only allowed websites can be accessed.
User Awareness - Lets you define policies for individual
users.
Quality of Service (QoS) - Enables bandwidth control and
lets you give priority to your most important traffic.
Threat Prevention
The Threat Prevention policy has these features:
Intrusion Prevention System (IPS) - Blocks attempts to
exploit known vulnerabilities in files and network protocols.
Anti-Virus - Blocks malware, such as viruses and worms,
before it can get into the network.
Anti-Spam - Blocks spam.
Anti-Bot - Detects bot-infected machines and blocks bot
Command and Control (C&C) communications.
Threat Emulation - Protects networks against unknown
threats in files that are downloaded from the internet or
attached to emails.

Table of Contents

Related product manuals