 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
 Terms
 Welcome
 Getting Started
 Managing Administrator Accounts
 Managing Gateways
 Managing Objects
 Managing Policies
 Creating an Access Control Policy
 Creating a Threat Prevention Policy
 Threat Prevention Components
 Assigning Administrators for Threat Prevention
 Analyzing Threats
 Out-of-the-Box Protection from Threats
 Getting Quickly Up and Running with the Threat Prevention Policy
 Enabling the Threat Prevention Software Blades
 Enabling the IPS Software Blade
 Enabling the Anti-Bot Software Blade
 Enabling the Anti-Virus Software Blade
 Enabling SandBlast Threat Emulation Software Blade
 Enabling the SandBlast Threat Extraction Blade
 Installing the Threat Prevention Policy
 Introducing Profiles
 Optimized Protection Profile Settings
 Predefined Rule
 The Threat Prevention Policy
 Creating Threat Prevention Rules
 The Check Point ThreatCloud
 Threat Prevention Scheduled Updates
 To Learn More About Threat Prevention
 Managing User Accounts
 Client Certificates for Smartphones and Tablets
 Preferences and Management Settings
 Management High Availability
 The ICA Management Tool
 Command Line Reference
|