Contents

 
 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
Expand Terms
 Welcome
Expand Getting Started
Expand Managing Administrator Accounts
Expand Managing Gateways
Expand Managing Objects
Expand Managing Policies
Expand Creating an Access Control Policy
Collapse Creating a Threat Prevention Policy
   Expand Threat Prevention Components
    Assigning Administrators for Threat Prevention
    Analyzing Threats
   Collapse Out-of-the-Box Protection from Threats
       Getting Quickly Up and Running with the Threat Prevention Policy
      Expand Enabling the Threat Prevention Software Blades
       Installing the Threat Prevention Policy
       Introducing Profiles
       Optimized Protection Profile Settings
       Predefined Rule
   Expand The Threat Prevention Policy
   Expand Creating Threat Prevention Rules
    The Check Point ThreatCloud
   Expand Threat Prevention Scheduled Updates
    To Learn More About Threat Prevention
Expand Managing User Accounts
Expand Client Certificates for Smartphones and Tablets
Expand Preferences and Management Settings
Expand Management High Availability
Expand The ICA Management Tool
Expand Command Line Reference