Optimized Protection Profile Settings

The Optimized profile is activated by default, because it gives excellent security with good Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. performance.

These are the goals of the Optimized profile, and the settings that achieve those goals:

Goal

Parameter

Setting

Apply settings to all the Threat Prevention Software Blades

Blades Activation

Activate the profile for IPSClosed Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System)., Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT., Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV., Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. and Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX.

Do not have a critical effect on performance

Performance impact

Activate protections that have a Medium or lower effect on performance.

Protect against important threats

Severity

Protect against threats with a severity of Medium or above.

Reduce false-positives

Confidence

Set to Prevent the protections with an attack confidence of Medium or High.

Set to Detect the protections with a confidence of Low.