This guide is designed for on-screen reading.
Copyright Notice
Important Information
The Check Point Threat Prevention Solution
The Threat Emulation Solution
Out-of-the-Box Protection from Threats
The Threat Prevention Policy
Threat Prevention Profiles
Creating Threat Prevention Rules
Configuring Threat Extraction on the Gateway
Threat Prevention API
Threat Prevention and UserCheck
IPS Protections
Monitoring Threat Prevention
The Check Point ThreatCloud
Configuring Advanced Threat Prevention Settings
Configuring Advanced Threat Emulation Settings
Using Threat Prevention with HTTPS Traffic
Using Anti-Spam and Mail
Using Traditional Anti-Virus
Troubleshooting
Appendix: Regular Expressions