Showing results for 
Search instead for 
Did you mean: 
Create a Post

Check Point For Beginners Lectures Series. Part 11 - Threat Prevention



Part 1 - Architecture                

Part 2 - Preparing the Lab 

Part 3 - Installing Security Management Server

Part 4 - Installing Security Gateway

Part 5 - Gaia WebUI and CLI 

Part 6 - Working with SmartConsole 

Part 7 - Managing Security Policies 

Part 8 - Network Address Translation 

Part 9 - Application Control, URL Filtering and Content Awareness

Part 10 - Identity Awareness

Part 11 - Threat Prevention                          <--- You are here

Part 12 - Logs and Reporting


In Lecture 7, we mentioned different types of Security Policies, such as Access Control, Threat Prevention, and Desktop Security. Previous lectures have been primarily focused on Access Control, which uses the Firewall, Application Control, URL Filtering, and Content Awareness Software Blades to reduce the attack surface by allowing only authorized traffic to cross the security system.


In this lecture, we discuss the Threat Prevention policy, which deals with the traffic which is already allow

TO READ THE FULL POST it's simple and free