EasyManua.ls Logo

Check Point 770 - Changing the Anti-Virus, Anti-Bot and Threat Emulation Policy

Check Point 770
112 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
88
To see the logs:
Go to Logs & Monitoring > Security Logs page.
Changing the Anti-Virus, Anti-Bot
and Threat Emulation Policy
Anti-Virus, Anti-Bot, and Threat Emulation share the same
policy. Your Check Point 770/790 Appliance is configured to
manage a standard policy.
To manually change the policy:
Go to Threat Prevention > Engine Settings.
You can:
Configure when files will be inspected.
By default, only incoming files are inspected.
Select policy overrides.
Select file types policy.
Block viruses from web and mail traffic (HTTP, SMTP,
and POP3) and from the File Transfer Protocol (FTP).
Prevent virus and bot attacks. You can also set detect
only mode and use the logs to see if there are any
attacks.
Protect against malicious files.

Table of Contents

Related product manuals