- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
I have read the other posts on the IPS Analyzer out there and realize that the protections listed as Threat Prevention protection # are coming from other blades. Is there a way to identify what blades these are coming from in the raw files that you run IPS Analyzer on? What is the best way to identify and remediate these?
Thanks in advance!
This is what my report looks like. The only blades currently enabled on this Cluster are Firewall, IPS, Anti-Bot, and Anti-Virus.
| Threat Prevention protection 21 |
|
| ROBOT TLS_RSA Scanning Attempt |
|
| Threat Prevention protection 1566 |
|
| Threat Prevention protection 190 |
|
| Threat Prevention protection 3 |
|
| Threat Prevention protection 2 |
|
| Threat Prevention protection 1582 |
|
| Threat Prevention protection 1583 |
|
| Threat Prevention protection 1584 |
|
| Threat Prevention protection 1585 |
|
| Threat Prevention protection 1586 |
|
| Threat Prevention protection 1587 |
|
| Threat Prevention protection 1581 |
|
| Threat Prevention protection 1568 |
|
| Threat Prevention protection 1567 |
|
| Threat Prevention protection 1597 |
|
| Threat Prevention protection 135 |
|
I have these showing up as Critical Protections. What is the best way to find what these are apart from emailing Omer Shliva?
Threat Prevention protection 421
Threat Prevention protection 362
Threat Prevention protection 398
Threat Prevention protection 433
Threat Prevention protection 913
Threat Prevention protection 902
Threat Prevention protection 903
Threat Prevention protection 881
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY