EasyManua.ls Logo

Check Point HARMONY R81 - Configuring Network Blades for Forensics Triggers and Remediation

Check Point HARMONY R81
451 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuring Forensics and Anti-Ransomware Policy Rules
R81 Harmony Endpoint Server Administration Guide|313
The Triggers include:
n
Events detected by Endpoint Security components: Anti-Bot, Threat Emulation, Anti-
Malware
n
Events detected by Network components: Anti-Bot, Threat Emulation, Anti-Malware,
URL Filtering
Configuring Network Blades for Forensics Triggers and Remediation
To make triggers and Remediation work for events detected by Network Threat Prevention
components, you must configure Security Gateway policy for the Threat Prevention
components: Anti-Bot, Anti-Virus, and Threat Emulation.
Each component must be enabled and have Protection settings of Prevent or Ask, which
include UserCheck.
Best practice is to use the Threat Prevention Recommended Profile (default) that includes all
required settings.

Table of Contents

Related product manuals