Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Oren_Koren
Employee Alumnus
Employee Alumnus

Best practices for Threat Prevention threat investigation

Hey all,

I am proud to expose our new Threat prevention best practice for threat analysis.

https://sc1.checkpoint.com/documents/Best_Practices/CP_R80.20_Best_Practices_for_Threat_Prevention/h...

in the best practice guide, you will be able to understand how you can use the 'cyber attack view' dashboard for finding the most important threats against your network.

the guide is divided into the following sections:

  • Videos for best practice - a short and informational video for top best practices you should take
  • for each section in the cyber attack view - a full documentation include:
    • Queries
    • best practice for each section
    • widgets descriptions
    • icons and actions descriptions

For R80.10 - you should use SK134634 and import the cyber attack view into your Smart-View

For R80.20 - the cyber attack view is already embedded into the version

as always, if you have any input or need - feel free to contact me: orenkor@checkpoint.com

Thanks,

Oren

3 Replies
Kim_Moberg
Advisor

The best  thanks for sharing

Best Regards
Kim
0 Kudos
Danny
Champion Champion
Champion

Cool stuff.

0 Kudos
Uri_Lewitus
Employee
Employee

Great stuff Oren

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events