- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello everyone!
The article https://support.checkpoint.com/results/sk/sk11054 contains a link to a guide from more than ten years ago.
Could you please tell me which document with information that is current for this year provides the breakdown of all gateway blades:
FW VPN IA ABOT APCL ASPM AV IPS URLF ADNS TE TEX ZP DLP IOTP PLBK SDWN
and management server blades:
COMP NPM EVNT RPRT PRVS LOGS POAU INSG CPLT AIOP TRID MPLB
?
Here is a partial list of the top of my head:
FW Firewall
VPN IPSec VPN
APCL Application Control
URLF URL Filtering
ADNC Advanced Networking and Clustering
DLP Data Loss Prevention
IA Identity Awareness
ABOT Anti-Bot
AV Anti-Virus
IPS IPS which is a common abbreviation for Intrusion Prevention System
TE Threat Emulation
TX / TEX Threat Extractions
ZP Zero Phishing
ASPM Anti-Spam & Email Security
NPM Network Policy Management
LOGS Logs
PRVS Provisioning
EVNT SmartEvent
COMP Compliance
PLBK Playblocks
SDWN SD-WAN
INSG Policy Insights
CPLT Copilot
AIOP AIOps
There you go.
Andy
***************************
FW – Firewall
VPN – IPsec VPN
MOB – Mobile Access
IA / ID – Identity Awareness
IPS – Intrusion Prevention System
AV – Anti-Virus
AB / ABOT – Anti-Bot
TX / TE – Threat Emulation (SandBlast Zero-Day Protection)
TXF / TXL – Threat Extraction (SandBlast Content Disarm & Reconstruction)
TXO – Threat Spectral (part of TE in cloud/hybrid)
AVN – Anti-Virus Network
DLP – Data Loss Prevention
APCL – Application Control
URLF – URL Filtering
MTA – Mail Transfer Agent (used with Anti-Spam / AV scanning)
ASPM – Anti-Spam
FDE – Full Disk Encryption
MEPP – Media Encryption & Port Protection
EPS / EP – Endpoint Security
EPM – Endpoint Policy Management
MAB / MEP – Remote Access VPN / Mobile Access for Endpoint
LOG / LOGS – Logging
MON – Monitoring
PRTX / PR – Compliance Blade (Protections / Policy Rulebase compliance)
REP – SmartEvent Correlation / Reporting
LEA – Log Export API (legacy)
CPView – Monitoring tool (not exactly a blade, but often grouped)
TXC – Threat Cloud
SCTP – Secure SCTP Inspection
QOS – Quality of Service (FloodGate-1)
VSX – Virtual System Extension
VTI – VPN Tunnel Interface (not exactly a blade, more a feature)
CloudGuard / CG – Cloud Security (IaaS integrations)
SMTX – SmartTask automation
There you go.
Andy
************************
This blade is part of Check Point's management server capabilities. It likely relates to assessing the security posture of endpoints and providing user awareness features, such as notifications or training prompts based on user behavior or policy violations.
This blade is associated with centralized threat intelligence and incident response capabilities. It helps security teams visualize, analyze, and respond to threats using data aggregated from various blades and sources.
This blade is used in environments with multiple management servers or high availability setups. It helps distribute policy management tasks across servers to improve performance and reliability.
These blades are typically part of Check Point’s management infrastructure, not the gateway blades like Firewall (FW), IPS, or URL Filtering. They enhance visibility, automation, and scalability in enterprise environments.
Here is a partial list of the top of my head:
FW Firewall
VPN IPSec VPN
APCL Application Control
URLF URL Filtering
ADNC Advanced Networking and Clustering
DLP Data Loss Prevention
IA Identity Awareness
ABOT Anti-Bot
AV Anti-Virus
IPS IPS which is a common abbreviation for Intrusion Prevention System
TE Threat Emulation
TX / TEX Threat Extractions
ZP Zero Phishing
ASPM Anti-Spam & Email Security
NPM Network Policy Management
LOGS Logs
PRVS Provisioning
EVNT SmartEvent
COMP Compliance
PLBK Playblocks
SDWN SD-WAN
INSG Policy Insights
CPLT Copilot
AIOP AIOps
IOTP: IoT Protect
The rest i cannot find. I used https://usercenter.checkpoint.com/uc/pdf/license/license_guide_bak.pdf as reference that contains the ancient stuff
Link in the you shared I cannot open so not sure what you are looking at to get a hint
There you go.
Andy
***************************
FW – Firewall
VPN – IPsec VPN
MOB – Mobile Access
IA / ID – Identity Awareness
IPS – Intrusion Prevention System
AV – Anti-Virus
AB / ABOT – Anti-Bot
TX / TE – Threat Emulation (SandBlast Zero-Day Protection)
TXF / TXL – Threat Extraction (SandBlast Content Disarm & Reconstruction)
TXO – Threat Spectral (part of TE in cloud/hybrid)
AVN – Anti-Virus Network
DLP – Data Loss Prevention
APCL – Application Control
URLF – URL Filtering
MTA – Mail Transfer Agent (used with Anti-Spam / AV scanning)
ASPM – Anti-Spam
FDE – Full Disk Encryption
MEPP – Media Encryption & Port Protection
EPS / EP – Endpoint Security
EPM – Endpoint Policy Management
MAB / MEP – Remote Access VPN / Mobile Access for Endpoint
LOG / LOGS – Logging
MON – Monitoring
PRTX / PR – Compliance Blade (Protections / Policy Rulebase compliance)
REP – SmartEvent Correlation / Reporting
LEA – Log Export API (legacy)
CPView – Monitoring tool (not exactly a blade, but often grouped)
TXC – Threat Cloud
SCTP – Secure SCTP Inspection
QOS – Quality of Service (FloodGate-1)
VSX – Virtual System Extension
VTI – VPN Tunnel Interface (not exactly a blade, more a feature)
CloudGuard / CG – Cloud Security (IaaS integrations)
SMTX – SmartTask automation
Thank you gentlemen! There are three blades left to find out 🙂
Can you direct me to where to find this view?
When using renewal tool, step 3 - Configure Security Subs, this form will appear when you change the subscriptions composition for a future period:
Im on it boss 🙂
There you go.
Andy
************************
This blade is part of Check Point's management server capabilities. It likely relates to assessing the security posture of endpoints and providing user awareness features, such as notifications or training prompts based on user behavior or policy violations.
This blade is associated with centralized threat intelligence and incident response capabilities. It helps security teams visualize, analyze, and respond to threats using data aggregated from various blades and sources.
This blade is used in environments with multiple management servers or high availability setups. It helps distribute policy management tasks across servers to improve performance and reliability.
These blades are typically part of Check Point’s management infrastructure, not the gateway blades like Firewall (FW), IPS, or URL Filtering. They enhance visibility, automation, and scalability in enterprise environments.
@yura_k If you come up with anything else, let me know. This was really good, I learned about blades I never even knew existed lol
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
12 | |
11 | |
11 | |
7 | |
7 | |
6 | |
5 | |
5 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY