• Kiếm tiền với Hostinger

    Kiếm Tiền Cùng Hostinger

    Bạn đang tìm kiếm cách kiếm thêm thu nhập online? Hãy tham gia ngay chương trình Affiliate của Hostinger! Với mỗi khách hàng đăng ký thông qua liên kết của bạn, bạn sẽ nhận được khoản hoa hồng hấp dẫn.

    Hostinger cung cấp các dịch vụ lưu trữ web (hosting) chất lượng cao với mức giá cạnh tranh, giúp bạn dễ dàng giới thiệu và thu hút người dùng.

    Đừng bỏ lỡ cơ hội tuyệt vời này để tăng thêm thu nhập thụ động.

    Tham Gia Ngay

(Check Point)Basic instructions for Threat Prevention on CheckPoint firewall devices

TigerDao

Administrator
Thành viên BQT
This article will provide basic instructions on Threat Prevention on CheckPoint firewall devices.

Threat Prevention Includes the following Software Blades:


  • IPS – Intrusion Prevention System provides protection against malicious and unwanted network traffic including known vulnerabilities and exploits, protocol misuse, outbound malware communications.
  • Anti-Bot – Detect bot-infected machines and prevent bot damage by blocking bot Command and Control communications.
  • Anti-Virus – Provides real-time virus signatures and anomaly-based protections.
  • Threat Emulation – Prevent infections from undetected exploits, zero-day attacks and targeted attacks based on sandboxing malware detection.
  • Threat Extraction – Remove exploitable content from documents, including live content and embedded objects, restructure files to remove potential threats, and quickly deliver sanitized content to users used to maintain business processes.

1.Set up Threat Prevention Policy:

– First we need to activate Threat Prevention Policyopen Security Gateway and put a check mark at IPS.


(IMG)


– Select “According to the Threat Prevention policy” and choose OK.

(IMG)


– Similar to active Anti-Virus and Anti-Bot.

– When active Threat Emulationselect “ThreatCloud Emulation Service” and choose Next.


(IMG)


– After a while you will see activation messageselect Finish.


(IMG)


– Now enable Threat Extraction blade and choose “Skip this configuration now”because we won’t be using the MTA for the installation.


(IMG)


– Go Security Policies > Policyby default we have a protection profile named “Optimized”.


(IMG)


– Let’s see Profile settings. Right click on Profile and select View.


(IMG)


– You can see the attached activated blades in Profile and main settings.


  • Performance Impact.
  • Severity.
  • Confidence Level.
(IMG)


– This profile will automatically enable protection measures at medium or lower give performance impact and medium or higher give severity.

– There are different actions for protection groups with different levels of trust:


  • Detect.
  • Prevent.
  • Inactive.
  • Ask.

– If necessary you can change the active profile from Optimized to Strict. This profile has more protections.

(IMG)

– You can see the extended configuration section in the bottom left corner SmartConsole.

(IMG)


Threat Tools Allows advanced configuration of IPS settings. It also allows update IPS signatures.

– Finally you need install Threat Prevention Policyselect “Threat Prevention” in policy installation.installationthen select Install.


(IMG)

2.Threat Prevention Logs:

– To view logs go to Logs & Monitorsselect Queries > Threat Prevention > All.


(IMG)


– Here you can see Threat Prevention logs.


(IMG)


!!! Thank you for following the article!!!

Xem tiếp...
 

Similar threads

O
Trả lời
0
Lượt xem
106
Osama Bin Javaid
O
Top