- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
I am interested in how people use IPS in R80.10. In R77.30 we would go through the flagged list then set the relevant protections to detect for 7 days – we would then clear down the flags for the ones we do not set. We would then review the logs to make sure there is no impact to legitimate site traffic (we have a customer facing SAAS platform) then we would set the flagged detects to protect and push policy. We would then repeat the cycle over a two week period.
In R80.10 I am thinking I would need to do the following to emulate this:-
Repeat steps 4 -7
What do other people do?
Thanks
Jon
Hi, in a few days we will publish an "IPS Best Practices in R80.10".
This document is a recommendation, of course any customer can do what he prefers. The document is in its final stages of review.
Regardless of the Check Point document, we are always interested to hear you guys' processes.
hi tomer,
any news on this document ?
delayed by a couple of days unfortunately.. we will update here.
in the meantime your thoughts on Jon's notes?
Any word on an update for the guide? Thanks!
Apologize for the delays, please follow this thread - https://community.checkpoint.com/message/13840-r8010-ips-best-practices-guide
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY