In This Section: |
The Check Point IPS Software Blade uses thousands of protections to keep your network safe. When you set up IPS for the first time, it is impossible to analyze each protection.
The Optimized Profile gives excellent security with good performance impact. This profile enables all protections that:
We recommend using the Optimized profile.
When enabling IPS for the first time, the most recent IPS protections will be loaded. We recommend that you use a manual update the first time you update IPS and then automate the process.
To manually update the IPS protections:
We highly recommend that you use SmartEvent reports for a clear view of the protections that generate logs for ease of profile tuning. Please review the Check Point R80.10 Logging and Monitoring Administration Guide.
After the first IPS update, let it run for at least a week.
When IPS has generated logs, review the logs and use this guide to set the protection’s mode to one of these:
Protections with high confidence can be set to Prevent as these protections were closely monitored and analyzed by Check Point.
Protections that generated events only for malicious traffic should be set to Prevent.
Use these indicators to identify events as malicious:
Protections that did not generate any events during the initial tuning can be set to Prevent mode.
Some protections generate events for both legitimate and malicious traffic. One possible reason is that legacy applications often use non-standard traffic and generate IPS events. We recommend that you look for patterns in the events of the legitimate traffic and create IPS network exceptions. For example, there can be a small set of Source or Destination IP addresses, services or ports.
If you can identify a pattern for the types of traffic:
If you cannot identify a pattern:
After the initial IPS update, configure IPS to update automatically and on a regular basis:
To configure IPS scheduled updates:
The Scheduled Update window opens.