This guide is designed for on-screen reading.
Copyright Notice
Show me the Videos
Important Information
The Check Point Threat Prevention Solution
The Threat Emulation Solution
Out-of-the-Box Protection from Threats
The Threat Prevention Policy
Threat Prevention Profiles
Creating Threat Prevention Rules
Configuring Threat Emulation on the Gateway
Configuring Threat Extraction on the Gateway
Mail Transfer Agent
ICAP Server
IPS Protections
Threat Prevention and UserCheck
Monitoring Threat Prevention
Configuring Advanced Threat Prevention Settings
Configuring Advanced Threat Emulation Settings
Threat Prevention API
The Check Point ThreatCloud
Threat Prevention Scheduled Updates
Using Threat Prevention with HTTPS Traffic
Using Anti-Spam and Mail
Troubleshooting
Appendix: Regular Expressions