Contents

 
Expand Check Point Firewall Security Solution
Expand Creating a Strong Firewall Security Policy
Expand Remote Access to the Network
Expand Creating VPN Policies
Expand Adding Users to the Security Policy
Expand Defining an Internet Access Policy
Expand Threat Prevention Policies
Collapse Securing Data
   Expand Overview
   Expand Enabling DLP
   Expand DLP Rule Base
   Collapse Analyzing and Tracking DLP
      Collapse Using SmartView Tracker
          DLP Actions
          DLP General Columns
          DLP Restricted Columns
       Using SmartEvent
Expand Maximizing Network Performance
Expand Configuring the NAT Policy
Expand Monitoring and Logging
 Index