CHAPTER 5
Configuring Threat
Prevention
In This Section:
Cyber Threats.............................................................................................................. 85
Enabling/Disabling Threat Prevention Control.................................................... 86
IPS Security Levels .................................................................................................... 87
Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy ..................... 88
Scheduling Blade Updates ....................................................................................... 89
Configuring the Anti-Spam Blade........................................................................... 90
Configuring the Anti-Spam Policy .......................................................................... 90
Configuring Anti-Spam Exceptions ........................................................................ 92
Configuring Anti-Spam to Detect-Only Mode....................................................... 92
Cyber Threats
Malware is a major threat to network operations that is
increasingly dangerous and sophisticated. Examples include
worms, blended threats (combinations of malicious code and
vulnerabilities for infection and dissemination) and Trojans.
To challenge today's malware landscape, Check Point's
comprehensive Threat Prevention solution offers a
multi-layered, pre- and post-infection defense approach and a
consolidated platform that enables enterprise security to deal
with modern malware.