- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
There are only three instances where an Access Policy installation is required when making Threat Prevention configuration changes:
The reason this is necessary is because Core Protections and Inspection Settings are actually implemented in the firewall code.
Changes to that configuration require an Access Policy installation.
When you edit a Core Protection, SmartConsole explicitly warns you of this:
Same with editing Inspection Settings:
If you've identified something outside of the above circumstances, I suggest involving TAC.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY