In This Section: |
The Protection browser shows the Threat Prevention Software Blades protection types and a summary of important information and usage indicators.
These are some of the default columns in the IPS protections summary table.
Column |
Description |
---|---|
Protection |
Name of the protection. A description of the protection type is shown in the bottom section of the pane. |
Industry Reference |
International CVE or CVE candidate name for attack. |
Performance Impact |
How this protection affects the performance of a Security Gateway. If possible, shows an exact figure. |
Severity |
Probable severity of a successful attack on your environment. |
Confidence Level |
How confident IPS is in recognizing the attack. |
profile_name |
The Activation setting for the protection for each IPS profile. |
You should activate protections of Critical and High Severity, unless you are sure that you do not want the specified protection activated.
For example, if a protection has a rating of Severity: High, and Performance Impact: Critical, make sure that the protection is necessary for your environment before you activate the protection.
Some attack types are less severe than others, and legitimate traffic may sometimes be mistakenly recognized as a threat. The confidence level value shows how well the specified protection can correctly recognize the specified attack.
The Confidence parameter can help you troubleshoot connectivity issues with the firewall. If legitimate traffic is blocked by a protection, and the protection has a Confidence level of Low, you have a good indication that more granular configurations might be required on this protection.
Some protections require the use of more resources or apply to common types of traffic, which adversely affects the performance of the gateways on which they are activated.
Note - The Performance Impact of protections is rated based on how they affect gateways of the R80.30 version. The Performance Impact on other gateways may be different than the rating listed on the protection.
For example, you might want to make sure that protections that have a Critical or High Performance Impact are not activated unless they have a Critical or High Severity, or you know the protection is necessary.
If your gateways experience heavy traffic load, be careful about activating High/Critical Performance Impact protections on profiles that affect a large number of mixed (client and server) computers.
Use the value of this parameter to set an optimal protection profile, in order to prevent overload on the gateway resources.
The IPS protections are divided into two main types:
The IPS Protections summary lets you quickly browse all IPS protections and their settings.
To show IPS protections:
You can search the Protections page by protection name, engine, or by any information type that is shown in the columns.
To filter the protections:
The Filters pane opens and shows IPS protections categories.
A window opens and shows the IPS protections categories.
The category is added to the Filters pane.
To sort the protections list by information:
Click the column header of the information you want.
Each profile is a set of activated protections and instructions for what IPS does if traffic inspection matches an activated protection. The procedures in this section explain how to change the action for a specified protection.
To manually activate a protection in all profiles:
The IPS Protections page opens.
Make sure that the action is on all profiles.
To manually activate a protection for a specific profile:
You can activate the protection for one profile and deactivate it for another profile. It will be active for some gateways and inactive for others.
If the protection is inactive according to the policy, you can override the policy preference or change the policy criteria.
To override the settings for this one protection, continue with this procedure.
You can remove the manually activated IPS protections and restore them to the profile settings. You can remove overrides on one protection, on selected protections or on all protections at the same time.
To remove IPS protection overrides on selected protections:
The IPS Protections page opens.
Note - Press CTRL to select more than one protection.
A warning message opens.
To remove IPS protection overrides from all protections:
The Profile Cleanup window opens.
To edit core protections:
Note - to filter for core protections, select Type Core in the Filters pane.
Check Point constantly develops and improves its protections against the latest threats. You can immediately update IPS with real-time information on attacks and all the latest protections. You can manually update the IPS protections and also set a schedule when updates are automatically downloaded and installed. IPS protections include many protections that can help manage the threats against your network. Make sure that you understand the complexity of the IPS protections before you manually modify the settings.
Note - To enforce the IPS updates, you must install the Threat Prevention Policy.
To update IPS Protections:
Note - From R77.20, IPS purge runs automatically after every IPS update. The Security Management Server saves only the versions from the last 30 days, and deletes the others.
You can configure a schedule for downloading the latest IPS protections and protection descriptions.
For troubleshooting or for performance tuning, you can revert to an earlier IPS protection package.
To revert to an earlier protection package:
To see newly downloaded protections:
The follow up mark lets you monitor specific IPS protections according to your selection. After you select the protections you wish to monitor, you can filter for them in the IPS Protections page and not have to search for them again.
To view protections marked for follow up:
In SmartConsole, go to Security Policies > Threat Prevention > IPS Protections > Filters, and select Follow Up.
You can mark individual protections for follow up or mark all updated protections for follow up in the IPS Updates page.
You can mark individual protections for Follow Up, which lets you quickly review the identified protections in the IPS Protections page. To make the Follow Up feature efficient, make sure to keep the list of marked protections as short as possible. Mark newly downloaded protections and any protection that you want to monitor, but remember to remove protections from this list when you are more confident that you configured them in the best way for your environment, for now. The longer the Follow Up list is, the more difficult it is to use it as a workable task list
To manually mark protections for follow up:
In the IPS Protections page, select one or more protections, right-click and select Follow Protection from the menu.
To unmark the protection, right-click the protection and clear Follow Protection.
Each time the IPS protections are updated, they will be automatically marked for follow up. To unmark the protections for follow up, click Unfollow Protections. To unmark all marked protections, go to Actions > Cleanup Options > Remove All Follow Up Flags.
Note - You can add significant information about a protection in the protection's comment field. To add a comment to a protection, double-click a protection and enter you comment in the Enter Protection Comment field, below the protection's name. You can only add comments to ThreatCloud protections (and not Core protections). You can enter information such as the package version or date of update. Such information is useful because you can search for it at a later date.
Check Point provides new and updated protections as they become available (see Updating IPS Protections). To give you complete control over the process of integrating new IPS protections, you can have them automatically marked for Follow Up, which gives you time to evaluate the impact the protections have on your environment.
To have new protections marked automatically:
In SmartConsole > Security Policies > Threat Prevention > Threat Tools > Updates > IPS >select Follow Protections.