- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Check Point’s Intrusion Prevention System (IPS) is a core component of Threat Prevention, providing proactive protection against a wide range of network threats. Over time, the IPS engine and its signature formats have evolved, leading to the coexistence of "normal" and "version 2 (Ver 2)" signatures. This post explains the technical reasons for maintaining both, their architectural differences, and best practices for deployment.
IPS Architecture Overview
Check Point IPS uses a multi-layered detection engine:
IPS Inspection Flow Diagram
Traffic is processed through multiple analysis stages, with signatures applied at different protocol layers.
Normal vs. V2 Signatures: Technical Comparison
| Feature | Normal Signature | V2 Signature (INSPECTv2) |
|---|---|---|
| Detection Engine | Classic Pattern Matcher | INSPECTv2 (advanced engine) |
| Coverage | Known threats | New threats, evasive techniques, improved accuracy |
| Performance | Lower resource usage | May require more CPU/memory, but optimized for accuracy |
| Compatibility | Legacy gateways | Modern gateways (R80+) |
| Update Frequency | Less frequent | Updated regularly |
Why Maintain Both Signature Types?
Performance Considerations
Best Practices for Managing Signature Versions
Summary
References
To my knowledge, there is no way to see what a given IPS signature matches.
Hi @AlbertoThree , sorry for the delay in responding, but I found a website where we can verify the signatures and what they protect. Here are the links.
https://advisories.checkpoint.com/advisories/
https://threatwiki.checkpoint.com/threatwiki/public.htm
Thanks for the info!
You're welcome, we're here to help each other. Actually, I wrote another article on how to do this research; here's the link.
https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-Signature-Evidence-the-shor...
I think this is totally on topic, @AlbertoThree , as @Timothy_Hall said, you need a screenshot of the video to see more details. You can add them here, like in the screenshot.
Thanks @WiliRGasparetto and @WiliRGasparetto for your answers!
As soon as I am back in the office I will take a look at IPS explorer as well as review the settings.
You're welcome, count on us anytime for this and other matters.
I wrote another article related to EPS troubleshooting; it's worth reading at the link.
https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-How-to-Filter-Events-by-CVE...
Hi everyone, I found where to search for subscriptions and wrote an article about it.
https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-Signature-Evidence-the-shor...
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 26 | |
| 13 | |
| 11 | |
| 10 | |
| 7 | |
| 7 | |
| 6 | |
| 6 | |
| 6 | |
| 6 |
Tue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceWed 13 May 2026 @ 11:00 AM (EDT)
TechTalk: The State of Ransomware Q1 2026: Key Trends and Their ImpactThu 14 May 2026 @ 07:00 PM (EEST)
Under the Hood: Presentando Check Point Cloud Firewall como ServicioTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY