<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273776#M104241</link>
    <description>&lt;P&gt;Reconsider your concepts because it is indeed true, hehe.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2026 03:36:48 GMT</pubDate>
    <dc:creator>WiliRGasparetto</dc:creator>
    <dc:date>2026-03-19T03:36:48Z</dc:date>
    <item>
      <title>Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273653#M104180</link>
      <description>&lt;P&gt;Check Point’s Intrusion Prevention System (IPS) is a core component of Threat Prevention, providing proactive protection against a wide range of network threats. Over time, the IPS engine and its signature formats have evolved, leading to the coexistence of "normal" and "version 2 (Ver 2)" signatures. This post explains the technical reasons for maintaining both, their architectural differences, and best practices for deployment.&lt;/P&gt;
&lt;P&gt;IPS Architecture Overview&lt;/P&gt;
&lt;P&gt;Check Point IPS uses a multi-layered detection engine:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Passive Streaming Library (PSL):&lt;/STRONG&gt; Reconstructs network streams for inspection.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Protocol Parsers:&lt;/STRONG&gt; Identify and separate protocols (HTTP, FTP, DNS, etc.) for context-aware analysis.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Context Management Infrastructure (CMI):&lt;/STRONG&gt; Determines which protections (signatures) apply to each protocol context.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Pattern Matcher:&lt;/STRONG&gt; The detection engine that uses signatures to identify malicious patterns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;IPS Inspection Flow Diagram&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WiliRGasparetto_0-1773790826936.jpeg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33789i9CFF407626537552/image-size/medium?v=v2&amp;amp;px=400" role="button" title="WiliRGasparetto_0-1773790826936.jpeg" alt="WiliRGasparetto_0-1773790826936.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Traffic is processed through multiple analysis stages, with signatures applied at different protocol layers.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-align-center"&gt;&lt;FONT face="arial black,avant garde"&gt;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;Normal vs. V2 Signatures: Technical Comparison&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Feature&lt;/TH&gt;
&lt;TH&gt;Normal Signature&lt;/TH&gt;
&lt;TH&gt;V2 Signature (INSPECTv2)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Detection Engine&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Classic Pattern Matcher&lt;/TD&gt;
&lt;TD&gt;INSPECTv2 (advanced engine)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Coverage&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Known threats&lt;/TD&gt;
&lt;TD&gt;New threats, evasive techniques, improved accuracy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Performance&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Lower resource usage&lt;/TD&gt;
&lt;TD&gt;May require more CPU/memory, but optimized for accuracy&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Compatibility&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Legacy gateways&lt;/TD&gt;
&lt;TD&gt;Modern gateways (R80+)&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Update Frequency&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Less frequent&lt;/TD&gt;
&lt;TD&gt;Updated regularly&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Normal Signatures:&lt;/STRONG&gt; Use traditional pattern matching, suitable for legacy environments and lower resource consumption.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;V2 Signatures:&lt;/STRONG&gt; Leverage the advanced INSPECTv2 engine, supporting complex logic, context awareness, and better detection of modern threats.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why Maintain Both Signature Types?&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Backward Compatibility:&lt;/STRONG&gt; Some older gateways may not support V2 signatures. Keeping both ensures all devices remain protected.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Redundancy:&lt;/STRONG&gt; If a V2 signature causes issues (e.g., false positives), the normal signature can provide fallback protection.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Gradual Migration:&lt;/STRONG&gt; Allows administrators to test V2 signatures in "Detect" mode before fully switching from normal signatures.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Maximum Coverage:&lt;/STRONG&gt; Certain threats may only be detected by one signature type, so using both maximizes security.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Performance Considerations&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;V2 signatures&lt;/STRONG&gt; can be more resource-intensive due to deeper inspection and advanced logic.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;IPS Tuning:&lt;/STRONG&gt; Administrators can enable/disable specific signatures or use different profiles for perimeter vs. internal gateways.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Bypass Under Load:&lt;/STRONG&gt; IPS can be configured to bypass traffic during high load to prevent bottlenecks, but this should be used cautiously.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Practices for Managing Signature Versions&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Test in Staging:&lt;/STRONG&gt; Always test new V2 signatures in a non-production environment.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor Updates:&lt;/STRONG&gt; Review IPS update notes and apply urgent protections as needed.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Separate Profiles:&lt;/STRONG&gt; Use different IPS profiles for different gateway roles (e.g., perimeter vs. datacenter).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Monitor Logs:&lt;/STRONG&gt; Watch for false positives/negatives and adjust protections accordingly.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Gradual Rollout:&lt;/STRONG&gt; Deploy V2 signatures in "Detect" mode before moving to "Prevent."&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Summary&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Normal signatures&lt;/STRONG&gt; ensure compatibility and stability.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;V2 signatures&lt;/STRONG&gt; provide enhanced detection and future-proofing.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Maintaining both&lt;/STRONG&gt; allows for a safe, flexible, and comprehensive security posture during transitions and upgrades.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;References&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95193" target="_blank" rel="noopener"&gt;ATRG: IPS (&lt;/A&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk95193" target="_blank" rel="noopener"&gt;sk95193&lt;/A&gt;)&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_ThreatPrevention_AdminGuide/Content/Topics-TPG/Introduction-to-Threat-Prevention.htm" target="_blank" rel="noopener"&gt;Threat Prevention Administration Guide (R81+)&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 17 Mar 2026 23:52:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273653#M104180</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-17T23:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273737#M104219</link>
      <description>&lt;P&gt;Crushed it!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 17:12:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273737#M104219</guid>
      <dc:creator>PedroMacena24</dc:creator>
      <dc:date>2026-03-18T17:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273738#M104220</link>
      <description>&lt;P&gt;So good, as always.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 17:16:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273738#M104220</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-18T17:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273739#M104221</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96099"&gt;@WiliRGasparetto&lt;/a&gt;, the recommendation to keep both versions of a signature active did make it into the Check Point Threat Prevention Specialist class, but there wasn't a clear explanation for why.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 17:20:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273739#M104221</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2026-03-18T17:20:35Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273764#M104232</link>
      <description>&lt;P&gt;Is the material already released? Is it version 81.20? If it hasn't been released, you can take the text and use it.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 23:43:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273764#M104232</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-18T23:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273765#M104233</link>
      <description>&lt;P&gt;I had a good teacher who taught me how to make good posts.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 23:46:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273765#M104233</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-18T23:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273766#M104234</link>
      <description>&lt;P&gt;thk's bro&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 23:47:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273766#M104234</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-18T23:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273767#M104235</link>
      <description>&lt;P&gt;Im 100% sure it was NOT me&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_tears_of_joy:"&gt;😂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 00:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273767#M104235</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-19T00:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273776#M104241</link>
      <description>&lt;P&gt;Reconsider your concepts because it is indeed true, hehe.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 03:36:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273776#M104241</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-19T03:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273793#M104245</link>
      <description>&lt;P&gt;&lt;BR /&gt;Does anything need to be done to enable the V2 variant of IPS ?&lt;/P&gt;&lt;P&gt;We're running R82 with Jumbo Hot Fix Accumulator Take 60.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 12:01:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273793#M104245</guid>
      <dc:creator>ccsjnw</dc:creator>
      <dc:date>2026-03-19T12:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273799#M104246</link>
      <description>&lt;P&gt;I dont believe so. As long as blade is enabled and updated, you should be good to go.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 12:31:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273799#M104246</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-19T12:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273830#M104254</link>
      <description>&lt;P&gt;Starting with Check Point version R82, the IPS Engine 2.0 (also called IPS version 2) is natively enabled in the system. In other words, it is not necessary to install any specific Jumbo Hotfix (such as Take 60) to activate or use the IPS Engine 2.0 in this version.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 17:06:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273830#M104254</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-19T17:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273831#M104255</link>
      <description>&lt;P&gt;exactly&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 17:06:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273831#M104255</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-19T17:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273832#M104256</link>
      <description>&lt;P&gt;I wondered at one point if it had to be enabled, but since I could not find it anywhere, logically assumed it was enabled by default.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 17:08:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273832#M104256</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-19T17:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273854#M104266</link>
      <description>&lt;P&gt;yes&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2026 01:30:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273854#M104266</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-20T01:30:34Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273982#M104347</link>
      <description>&lt;P&gt;Congrats, Wili!! Excellent post&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 13:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/273982#M104347</guid>
      <dc:creator>asafebelo</dc:creator>
      <dc:date>2026-03-23T13:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274012#M104361</link>
      <description>&lt;P&gt;thank's bro&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 21:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274012#M104361</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-23T21:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274042#M104370</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In the best practices for &lt;SPAN&gt;Managing Signature Versions&lt;/SPAN&gt;, it is recommended to test V2 signatures in a non-production environment or to deploy them in Detect Mode.&lt;/P&gt;&lt;P&gt;I have a question that may sound a bit silly: how can a “V2 UP signature” be identified in SmartConsole?&lt;/P&gt;&lt;P&gt;In SmartConsole, I could not find any filters that allow sorting by IPS signature version.&lt;/P&gt;&lt;P&gt;And when I view the details of an IPS signature (as in the screenshot below of a recent signature), I cannot find any information indicating whether it is a Normal or V2 signature&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Signature_IPS.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33827iE254D548EA7FD2C0/image-size/large?v=v2&amp;amp;px=999" role="button" title="Signature_IPS.png" alt="Signature_IPS.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance for your insights.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 06:41:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274042#M104370</guid>
      <dc:creator>constant69</dc:creator>
      <dc:date>2026-03-24T06:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274044#M104371</link>
      <description>&lt;P&gt;The link to "Threat Prevention Administration Guide (R81+)" is not working (for me). I get "Not found"&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 06:59:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274044#M104371</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2026-03-24T06:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Technical Deep Dive Why Maintain Both Normal and V2 IPS Signatures in Check Point?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274089#M104396</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Your question is not silly at all!&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43988"&gt;@constant69&lt;/a&gt;&amp;nbsp;&amp;nbsp;Most people I know don't know how to see that.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;A step-by-step guide on how to find version 2 in an IP signature.&lt;/P&gt;
&lt;P&gt;You need to open the SmartConsole.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Go to &lt;STRONG&gt;Security Policies&lt;/STRONG&gt;.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_12f77a2f8e8abcWiliRGasparetto_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditor_12f77a2f8e8abcWiliRGasparetto_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then go to &lt;STRONG&gt;Threat Prevention&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Open &lt;STRONG&gt;Custom Policy&lt;/STRONG&gt;.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_12f77a2f8e8abcWiliRGasparetto_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captura de tela 2026-03-24 145028.png" style="width: 228px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33831i7AC0E46198CDE629/image-size/large?v=v2&amp;amp;px=999" role="button" title="Captura de tela 2026-03-24 145028.png" alt="Captura de tela 2026-03-24 145028.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the lower-right corner, go to &lt;STRONG&gt;IPS Protections&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ips pro.png" style="width: 303px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33832iF2B8D1CD4652360A/image-size/large?v=v2&amp;amp;px=999" role="button" title="ips pro.png" alt="ips pro.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the lower-left corner, go to &lt;STRONG&gt;ThreatCloud&lt;/STRONG&gt; and select the checkbox.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_12f77a2f8e8abcWiliRGasparetto_3" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="thear.png" style="width: 258px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33833iD4B6C1BC03859521/image-size/large?v=v2&amp;amp;px=999" role="button" title="thear.png" alt="thear.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;At that point, you will need to look for the signature where you want to check version 2, or you can use the filter in the upper-left corner to filter by &lt;STRONG&gt;version 2&lt;/STRONG&gt;, and you will see all available version 2 signatures.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ver 2.png" style="width: 628px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33834iD49E45A687852E0B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ver 2.png" alt="ver 2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ver 2 2 .png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33835i9D5EDB9263D73A80/image-size/large?v=v2&amp;amp;px=999" role="button" title="ver 2 2 .png" alt="ver 2 2 .png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From this stage, you can take whatever actions you prefer.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="final ips.png" style="width: 451px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33836i0E98B9A0ADA3C392/image-size/large?v=v2&amp;amp;px=999" role="button" title="final ips.png" alt="final ips.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 17:57:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Technical-Deep-Dive-Why-Maintain-Both-Normal-and-V2-IPS/m-p/274089#M104396</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-24T17:57:42Z</dc:date>
    </item>
  </channel>
</rss>

