Contents

 
 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
Expand Terms
 Welcome
Expand Getting Started
Expand Managing Administrator Accounts
Expand Managing Gateways
Expand Managing Objects
Expand Managing Policies
Expand Creating an Access Control Policy
Collapse Creating a Threat Prevention Policy
   Expand Threat Prevention Components
    Assigning Administrators for Threat Prevention
    Analyzing Threats
   Expand Out-of-the-Box Protection from Threats
   Collapse The Threat Prevention Policy
       Workflow for Creating a Threat Prevention Policy
      Collapse Threat Prevention Policy Layers
          Action Enforcement in Multiple-Layered Security Policies
          Creating a New Ordered Layer
          Threat Prevention Layers in Pre-R80 Gateways
       Threat Prevention Rule Base
   Expand Creating Threat Prevention Rules
    The Check Point ThreatCloud
   Expand Threat Prevention Scheduled Updates
    To Learn More About Threat Prevention
Expand Managing User Accounts
Expand Client Certificates for Smartphones and Tablets
Expand Preferences and Management Settings
Expand Management High Availability
Expand The ICA Management Tool
Expand Command Line Reference