 Important Information
 Check Point R80.10 IPS Best Practices
 Introduction
 Initial IPS Configuration Process
 Ongoing IPS Configuration Process
 IPS Software Blade Maintenance
 Extending the IPS Configuration
 Cloning the Profile
 Configuring the Profile
 Configuring Inspection Settings Protections
 Email Inspection Settings
 Optimizing Web Security Protections
 Excluding Protections
 Separate Profiles
 Performance Tuning
|