- CheckMates
- :
- Products
- :
- General Topics
- :
- Blocking of Custom/Malicious Request
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Blocking of Custom/Malicious Request
they were asking if we can block requests at the checkpoint r80.10. The suggestion was to use the Application Control. An example of a malicious request is "www[.]example[.]com/wp/wp-login[/]php.
1 Reply
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can block with App Control, but you can also do it with Threat Prevention.
