Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Trevor_Bruss
Contributor

Autonomous Policy and DNS Malware Trap

If using the Autonomous Policy is there still a way to configure the use of the DNS Malware Trap?

 

Also, what benefit do I get from using the Autonomous Policy over just selecting one of the pre-designed Custom Policies? Aren't they using the same settings? I've been using Custom policies for quite some time, and I never have touched the settings after we set it up, so how is that any different than say choosing the Perimeter policy on the Autonomous side?

 

Just trying to determine the benefits as I don't normally tweak anything and just go with the optimized versions Checkpoint has setup.

0 Kudos
2 Replies
Chris_Atkinson
Employee Employee
Employee

Have you reviewed the use cases & advantages outlined in sk163593 / sk169952?

CCSM R77/R80/ELITE
0 Kudos
Trevor_Bruss
Contributor

Yes, but those really don't answer my question especially when it comes to the DNS Malware Trap.

I guess I'll keep going with using my Custom policy as it seems to do everything that the Autonomous does and I don't see any added benefit in my case. I'm already hands-off with my configuration. Thanks!

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events