Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
IPS
Anti-Bot and Anti-Virus
Protecting Networks from Bots
Identifying Bot Infected Computers
Protecting Networks from Viruses
ThreatSpect Engine and ThreatCloud Repository
Learning about Malware
Examining Anti-Bot and Anti-Virus Protections
Enabling the Anti-Bot and Anti-Virus Software Blades
Anti-Bot and Anti-Virus Rule Base
Sample Rule Base
Anti-Spam
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|