Skip navigation
All Places >

Threat Prevention

Log in to follow, share, and participate in this community.

Recent Activity

Demith Samaraweera
Hi All We have a situation where R80.10 Mgmt/GW we have created multiple Threat Prevention (TP) rules, each rule with different blade (Profile) enable,  e.g. Rule 1- IPS Rule 2 - AV Rule 3 - Threat Prevention Isn't Check Point supposed to go through each and every rule and execute all blades? What we see it just hits the first rule (IPS)… (Show more)
in Threat Prevention
Omer Shliva
(1) IntroductionThe IPS Analyzer Tool collects information about the IPS Protections usage. The IPS statistics information indicates which patterns out of all IPS protections were called into action (but not necessarily matched) and how many times. Analyzer tool processes the statistic outputs and produces a clear HTML report based on that output.…
in Threat Prevention
Omer Shliva
This document defines how severity, performance and confidence levels are assigned to new protections across various threat prevention blades.
in Threat Prevention
Santiago Platero
Hi community long time no see (dunno why these days can't login to CheckMates), I'm seeing some strange things in the Firewall and Threat Emulation logs, but first some context:   - R80.20 GA Management - R80.10 Security Gateway, with Threat Emulation blade enabled (emulation occurs in the Check Point Cloud), MTA enabled and imported the SSL… (Show more)
in Threat Prevention
Carlos Jara
Hi,   We have a lot of "Host Port Scan" events in.   How can I avoid "Host Port Scan"?   In "Core Protecctions" we can only choice between "Accept" & "Inactive".   Could youo help me?  
in Threat Prevention
Tomer Sole
The IPS Analyzer Tool runs on your gateway for a short amount of time, and issues an HTML report of which individual IPS protections took the most CPU and RAM on the gateway during the runtime of the tool.   Supported Gateways are R77 and above.   For more information go to IPS Analyzer Tool - How to analyze IPS performance efficiently    I… (Show more)
in Threat Prevention
Serged7631f0d-a6fd-4106-8d02-849f1cfd08dd
Hello CheckMakes,   I was updating vulnerability management process with recent links point to each vendor dedicated security Advisories page. Did all other firewall vendors without a problem and stumbled into an issue with Check Point. I was not able to find page dedicated to _product_ vulnerabilities.   I can not find the way to search for… (Show more)
in Threat Prevention
slobodan milidrag
Dear team,   I need your help to better understand IPS Core protections. I found in documentation: IPS Core protections - These protections are included in the product and are assigned per gateway. They are part of the Access Control policy.   Why is that ?  If IPS Core protections are assigned globally (per gateway), why in Signature I have… (Show more)
in Threat Prevention
Tal Eisner
@Check Point is pleased to announce its SandBlast Agent solution passed AV-TEST Institute’s lab tests with excellent results and has been named a “Top Product” by the independent IT security organization. This announcement comes on the heels of Check Point being named a leader in the Forrester Wave™ Endpoint Security Suites, Q2 2018 report. The… (Show more)
Michael Gonnason
Does anyone have any details regarding "TCP Segment limit enforcement" is? We are running R80.10 take 70 on all devices.   We recently had an issue where our Checkpoint was causing a slowdown in all traffic, which was solved by failing over the cluster.    After that I was looking through the logs and saw millions of matches on the IPS… (Show more)
in Threat Prevention
Load more items