- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Check Point’s Intrusion Prevention System (IPS) is a core component of Threat Prevention, providing proactive protection against a wide range of network threats. Over time, the IPS engine and its signature formats have evolved, leading to the coexistence of "normal" and "version 2 (Ver 2)" signatures. This post explains the technical reasons for maintaining both, their architectural differences, and best practices for deployment.
IPS Architecture Overview
Check Point IPS uses a multi-layered detection engine:
IPS Inspection Flow Diagram
Traffic is processed through multiple analysis stages, with signatures applied at different protocol layers.
Normal vs. V2 Signatures: Technical Comparison
| Feature | Normal Signature | V2 Signature (INSPECTv2) |
|---|---|---|
| Detection Engine | Classic Pattern Matcher | INSPECTv2 (advanced engine) |
| Coverage | Known threats | New threats, evasive techniques, improved accuracy |
| Performance | Lower resource usage | May require more CPU/memory, but optimized for accuracy |
| Compatibility | Legacy gateways | Modern gateways (R80+) |
| Update Frequency | Less frequent | Updated regularly |
Why Maintain Both Signature Types?
Performance Considerations
Best Practices for Managing Signature Versions
Summary
References
Crushed it!
thk's bro
So good, as always.
I had a good teacher who taught me how to make good posts.
Im 100% sure it was NOT me 😂
Reconsider your concepts because it is indeed true, hehe.
Thanks @WiliRGasparetto, the recommendation to keep both versions of a signature active did make it into the Check Point Threat Prevention Specialist class, but there wasn't a clear explanation for why.
Is the material already released? Is it version 81.20? If it hasn't been released, you can take the text and use it.
Does anything need to be done to enable the V2 variant of IPS ?
We're running R82 with Jumbo Hot Fix Accumulator Take 60.
I dont believe so. As long as blade is enabled and updated, you should be good to go.
exactly
I wondered at one point if it had to be enabled, but since I could not find it anywhere, logically assumed it was enabled by default.
yes
Starting with Check Point version R82, the IPS Engine 2.0 (also called IPS version 2) is natively enabled in the system. In other words, it is not necessary to install any specific Jumbo Hotfix (such as Take 60) to activate or use the IPS Engine 2.0 in this version.
Congrats, Wili!! Excellent post
thank's bro
Hello,
In the best practices for Managing Signature Versions, it is recommended to test V2 signatures in a non-production environment or to deploy them in Detect Mode.
I have a question that may sound a bit silly: how can a “V2 UP signature” be identified in SmartConsole?
In SmartConsole, I could not find any filters that allow sorting by IPS signature version.
And when I view the details of an IPS signature (as in the screenshot below of a recent signature), I cannot find any information indicating whether it is a Normal or V2 signature
Thank you in advance for your insights.
Your question is not silly at all! @constant69 Most people I know don't know how to see that.
A step-by-step guide on how to find version 2 in an IP signature.
You need to open the SmartConsole.
Go to Security Policies.
Then go to Threat Prevention.
Open Custom Policy.
In the lower-right corner, go to IPS Protections.
In the lower-left corner, go to ThreatCloud and select the checkbox.
At that point, you will need to look for the signature where you want to check version 2, or you can use the filter in the upper-left corner to filter by version 2, and you will see all available version 2 signatures.
From this stage, you can take whatever actions you prefer.
Thank you very much for your detailed explanations on identifying new IPS signatures.
Regards
Yor Welcome
If you still have any questions, feel free to ask.
The link to "Threat Prevention Administration Guide (R81+)" is not working (for me). I get "Not found"
Hi,
I have a question that is maybe a bit of topic, but maybe you have an answer to that.
I have some IPS Prevent logs, and some of them have a packet captures available, but not all of them, even though it is enabled.
My question is how can I find out which exact pattern triggered the IPS rule?
Kind regards,
Albert
Only 1 packet capture per IPS protection is saved at any one time, unless you select the "Packet Capture" checkbox on the IPS protection itself (not just in the Track column of the TP policy). You can examine exactly what pattern the IPS Protection is actually looking for by signing up here: sk182083: IPS Explorer
Hi,
I tried to 'apply' to get access to IPS Explorer, but I got this reaction:
My apologies, this is not an open feature, rather it is a legacy capability that exposes sensitive information and is therefore limited to a small number of customers under strict NDA agreements.
Yep... same for me 😞
Yes. same for me
So if IPS Explorer is not available, what other means do we have to find out the exact pattern the IPS protection matched on?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 29 | |
| 12 | |
| 12 | |
| 8 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 5 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceTue 19 May 2026 @ 06:00 PM (IDT)
AI Security Masters E8 - Claude Mythos: New Era in Cyber SecurityAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY