Contents

 
 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
Expand Terms
 Welcome
Expand Getting Started
Expand Managing Administrator Accounts
Expand Managing Gateways
Expand Managing Objects
Expand Managing Policies
Expand Creating an Access Control Policy
Collapse Creating a Threat Prevention Policy
   Expand Threat Prevention Components
    Assigning Administrators for Threat Prevention
    Analyzing Threats
   Expand Out-of-the-Box Protection from Threats
   Expand The Threat Prevention Policy
   Collapse Creating Threat Prevention Rules
      Expand Configuring Mail Settings
      Expand Configuring IPS Profile Settings
      Expand Configuring Anti-Virus Settings
      Expand Configuring Anti-Bot Settings
      Expand Configuring Threat Emulation Settings
      Expand Configuring Threat Extraction Settings
       Configuring a Malware DNS Trap
      Expand Exception Rules
    The Check Point ThreatCloud
   Expand Threat Prevention Scheduled Updates
    To Learn More About Threat Prevention
Expand Managing User Accounts
Expand Client Certificates for Smartphones and Tablets
Expand Preferences and Management Settings
Expand Management High Availability
Expand The ICA Management Tool
Expand Command Line Reference