The article of the week is ATRG: Threat Extraction.
It describes everything you need to know about Threat Extraction with Check Point:
- Need for Threat Extraction and its concept
- Its place within Threat Prevention capabilities of Check Point
- Supported implementation modes, configurations and requirements
- Config files and CLI commands
- Troubleshooting techniques and debug suggestions
The article also contains a very detailed FAQ section and a list of references to related SecureKnowledge articles.