EasyManua.ls Logo

Check Point UTM-1 Edge - Overview

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Overview
Chapter 13: Using SmartDefense 375
Chapter 13
This chapter explains how to use Check Point SmartDefense Services.
This chapter includes the following topics:
Overview..................................................................................................375
Configuring SmartDefense.......................................................................376
SmartDefense Categories .........................................................................383
Resetting SmartDefense to its Defaults....................................................424
Overview
The UTM-1 appliance includes Check Point SmartDefense Services, based on Check Point
Application Intelligence. SmartDefense provides a combination of attack safeguards and
attack-blocking tools that protect your network in the following ways:
Validating compliance to standards
Validating expected usage of protocols (Protocol Anomaly Detection)
Limiting application ability to carry malicious data
Controlling application-layer operations
In addition, SmartDefense aids proper usage of Internet resources, such as FTP, instant
messaging, Peer-to-Peer (P2P) file sharing, file-sharing operations, and File Transfer
Protocol (FTP) uploading, among others.
Using SmartDefense

Table of Contents

Related product manuals