Configuring a DLP Gateway or Security Cluster

For DLP integrated configuration, enable the DLP Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. as one of the Software Blades on a Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. In a dedicated DLP Gateway, the Data Loss PreventionClosed Check Point Software Blade on a Security Gateway that detects and prevents the unauthorized transmission of confidential information outside the organization. Acronym: DLP. Software Blade is enabled on an individual Security Gateway (or Security ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing.).

In ClusterXL Load Sharing cluster, the DLP Software Blade works only when the policy contains DLP rules that use the Detect, Inform, or Prevent actions (see DLP Rule Actions). ClusterXL Load Sharing do not support the Ask DLP action.

In a Cluster with enabled DLP Software Blade, state synchronization occurs at two minutes' interval. Therefore, if there is a cluster failover, the new Active cluster memberClosed Security Gateway that is part of a cluster. can possibly not know about DLP incidents that happened in the two minutes since the cluster failover.