Some IPS protections require more in-depth customization to give a network the best security.
Note - If you track traffic for all countries, IPS generates too many logs.
Activate protections for the protocols that your environment uses for emails and add customized security to the mail servers.
By default, when you configure the POP3/IMAP Security settings in Protections > By Protocol > IPS Software Blade > Application Intelligence > Mail, they apply to all hosts that are defined as mail servers based on the Action settings of each IPS profile. You can also limit the scope of this protection to only the specified mail servers.
To specify which hosts get the POP3/IMAP protection settings:
The Protection Details - POP3/IMAP Security configuration window opens.
The Select Servers window opens, and all mail servers are selected by default.
The POP3/IMAP Security protection has a list of commands that IPS recognizes and inspects. The definitions of the POP3 commands apply to all IPS profiles. In the Protection Details - POP3/IMAP Security configuration window, you can edit the list of POP3 commands that apply to all profiles or edit the list of POP3 commands that apply to specific profiles.
To edit the list of POP3 commands that apply to all profiles:
The Add custom POP3 command window opens.
To block or allow a POP3 command for a profile:
The Protection Settings window opens.
When you finish editing POP3/IMAP Security settings, click OK to save them and exit the Protection Details - POP3/IMAP Security configuration window.
You can manage Web Intelligence to configure the Web server settings to maximize security and reduce the Security Gateway performance, or the opposite.
Some inspection settings that are too severe can have a negative impact on connectivity to and from valid Web servers.
Applying these restrictions (activating these protections) is in general good practice, but they may block valid sites or important applications. Applying these protections to specific Web servers can solve the connectivity problems, and may enhance CPU performance. This exclusion of a Web server from a particular protection is global to all profiles.
To configure Web Protection scope:
The Check Point Host window opens, displaying the Web Server category, which is added to a host that is defined as a Web server.
You can configure connectivity-security balance for each type of Web Intelligence protection in the Web Server > Protections window, but enforcement of these configurations always depends on whether they are activated by the Web server's IPS profile.