Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
Securing Data
Overview
Enabling DLP
DLP Rule Base
Analyzing and Tracking DLP
Using SmartView Tracker
DLP Actions
DLP General Columns
DLP Restricted Columns
Using SmartEvent
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|