 Check Point IPS R76 Administration Guide
 The Check Point IPS Solution
 Getting Started with IPS
 Managing Gateways
 Managing Profiles and Protections
 Configuring Specific Protections
 SNORT Signature Support
 Configuring Network Security Settings
 Configuring Application Intelligence
 Configuring Web Intelligence
 Configuring Web Intelligence Protections
 Malicious Code
 Defining HTTP Worm Patterns
 Malicious Code: Connectivity Versus Security
 Application Layer
 Defining Commands and Distinguished Names
 Information Disclosure
 HTTP Protocol Inspection
 Customizable Error Page
 Connectivity/Performance Versus Security
 Managing Application Controls
 Configuring Geo Protections
 Configuring IPS Pattern Granularity
 Configuring Implied IPS Exceptions
 Monitoring Traffic
 Optimizing IPS
 Updating Protections
 Regular Expressions
 Index
|