Oren Koren

Best practices for Threat Prevention threat investigation

Blog Post created by Oren Koren Employee on Jan 20, 2019

Hey all,

I am proud to expose our new Threat prevention best practice for threat analysis.

https://sc1.checkpoint.com/documents/Best_Practices/CP_R80.20_Best_Practices_for_Threat_Prevention/html_frameset.htm

 

 

in the best practice guide, you will be able to understand how you can use the 'cyber attack view' dashboard for finding the most important threats against your network.

the guide is divided into the following sections:

  • Videos for best practice - a short and informational video for top best practices you should take
  • for each section in the cyber attack view - a full documentation include:
    • Queries
    • best practice for each section
    • widgets descriptions
    • icons and actions descriptions

 

For R80.10 - you should use SK134634 and import the cyber attack view into your Smart-View

For R80.20 - the cyber attack view is already embedded into the version

 

as always, if you have any input or need - feel free to contact me: orenkor@checkpoint.com

 

Thanks,

Oren

Outcomes