 Check Point Firewall Security Solution
 Creating a Strong Firewall Security Policy
 Remote Access to the Network
 Creating VPN Policies
 Adding Users to the Security Policy
 Defining an Internet Access Policy
 Threat Prevention Policies
 IPS
 IPS Protection Profiles
 Enabling IPS
 Using IPS Profiles
 Adding Network Exceptions
 Browsing IPS Protections
 Updating IPS Protections
 Configuring Geo Protections
 Anti-Bot and Anti-Virus
 Anti-Spam
 Securing Data
 Maximizing Network Performance
 Configuring the NAT Policy
 Monitoring and Logging
 Index
|