Contents

 
 Copyright Notice
 Show me the Videos
 Important Information
 Threat Prevention Administration Guide
Expand Terms
Expand The Check Point Threat Prevention Solution
Expand The Threat Emulation Solution
Expand Out-of-the-Box Protection from Threats
Expand The Threat Prevention Policy
Expand Threat Prevention Profiles
Expand Creating Threat Prevention Rules
Expand Configuring Threat Emulation on the Gateway
Expand Configuring Threat Extraction on the Gateway
Expand Mail Transfer Agent
Expand ICAP Server
Expand IPS Protections
Expand Threat Prevention and UserCheck
Expand Monitoring Threat Prevention
Expand Configuring Advanced Threat Prevention Settings
Expand Configuring Advanced Threat Emulation Settings
Expand Threat Prevention API
Expand The Check Point ThreatCloud
Expand Threat Prevention Scheduled Updates
Expand Using Threat Prevention with HTTPS Traffic
Collapse Using Anti-Spam and Mail
    Introduction to Anti-Spam and Mail Security
   Expand Mail Security Overview
   Collapse Configuring Anti-Spam
       Configuring a Content Anti-Spam Policy
       Configuring an IP Reputation Policy
       Configuring a Block List
       Configuring Anti-Spam SMTP
       Configuring Anti-Spam POP3
       Configuring Network Exceptions
       Configuring an Allow List
       Selecting a Customized Server
       Anti-Spam on UTM-1 Edge Devices
       Bridge Mode and Anti-Spam
   Expand Configuring Anti-Virus Protection for Mail
    Configuring a Disclaimer
    Anti-Spam Logging and Monitoring
 Threat Prevention Best Practices Video
Expand Troubleshooting
Expand Appendix: Regular Expressions