- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Checkmate,
Is there a best practice document for determining update interval for threat prevention database and appcontrol database?
example
Is the default time interval on the smart console in accordance with best practice?
I currently have the issue of high bandwidth towards *.checkpoint.com
Any impact if i change the deafult time interval to let say every midnight? since i got asked from operational team why CP has a lot query to CP domains. Merci!
As part of Threat Prevention, your GWs are using live communications with Threat Cloud for Anti-Bot live data, URL filtering, Applicaiton control and AVI, if any. These live updates allow us to provide you with immediate protection from recently discovered attacks.
On top, there are other communications Check Point security systems, both MGMT and GWs, may need. Please look into sk83520 for more details.
It is expected behavior for gateways to reach out to various checkpoint.com addresses, particularly if you are using URL Filtering or any of the Threat Prevention features.
We document the specific locations here: https://support.checkpoint.com/results/sk/sk83520
Increasing/decreasing these signature update intervals are unlikely to change the number of requests the gateway generates, as the requests are in response to real-time traffic received by the gateway.
IPS/AB updates should not consume much bandwidth, even if done every second hour.
Are you sure this is because of your management side updates and NOT the actual communication to Threat Cloud from your GWs?
yes we have some query from our GWs, is this due to communication with Threat Cloud? why directly to GWs not via management?
and also i have policy to block communication to several domain, manually in policy. but i think this is not related with high bandwidth utilization.
As part of Threat Prevention, your GWs are using live communications with Threat Cloud for Anti-Bot live data, URL filtering, Applicaiton control and AVI, if any. These live updates allow us to provide you with immediate protection from recently discovered attacks.
On top, there are other communications Check Point security systems, both MGMT and GWs, may need. Please look into sk83520 for more details.
It is expected behavior for gateways to reach out to various checkpoint.com addresses, particularly if you are using URL Filtering or any of the Threat Prevention features.
We document the specific locations here: https://support.checkpoint.com/results/sk/sk83520
Increasing/decreasing these signature update intervals are unlikely to change the number of requests the gateway generates, as the requests are in response to real-time traffic received by the gateway.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 20 | |
| 16 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY