The Threat Prevention Policy

Workflow for Creating a Threat Prevention Policy

Threat Prevention lets you customize profiles that meet the needs of your organization.

Ideally, you might want to set all protections to PreventClosed UserCheck rule action that blocks traffic and files and can show a UserCheck message. in order to protect against all potential threats. However, to let your gateway processes focus on handling the most important traffic and report only the most concerning threats, you need to determine the most effective way to apply the Threat Prevention settings.

When you define a new Threat Prevention profile, you can create a Threat Prevention Policy which activates only the protections that you need and prevents only the attacks that most threaten your network.

To Learn More about Policy Packages

To learn more about Policy Packages, see the R81 Security Management Administration Guide.

Threat Prevention Policy Layers

You can create a Threat Prevention Rule Base with multiple Policy Layers. Policy Layers help you organize your Rule Base to best suit your organizational needs. You can divide the Policy Layers by services or networks. Each Policy Layer calculates its action separately from the other Layers. In case of one Layer in the policy package, the rule enforced is the first rule matched. In case of multiple Layers:

  • If a connection matches a rule in only one Layer, then the action enforced is the action in that rule.

  • When a connection matches rules in more than one Layer, the gateway enforces the strictest action and settings.

Important - When the Threat Prevention blades run in MTA mode, the gateway enforces the automatic MTA rule, which is created when MTA is enabled on the gateway.

Action Enforcement in Multiple-Layered Security Policies

These examples show which action the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. enforces when a connection matches rules in more than one Policy Layers.

Creating a New Policy Layer

This section explains how to create a new Threat Prevention Policy Layer. You can configure reuse of Threat Prevention Policy Layers in different Policy Packages, and set different administrator permissions per Threat Prevention Layer.

Threat Prevention Layers in Pre-R80 Gateways

In pre-R80 versions, the IPS Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. was not part of the Threat Prevention Policy, and was managed separately. In R80.XX versions, the IPS Software Blade is integrated into the Threat Prevention Policy.

When you upgrade SmartConsole to R80.XX from earlier versions, with some Security Gateways upgraded to R80.XX, and other Security Gateways remaining in previous versions:

  • For pre-R80 gateways with IPS and Threat Prevention Software Blades enabled, the policy is split into two parallel layers: IPS and Threat Prevention.

    To see which Security Gateway enforces which IPS profile, look at the Install On column in the IPS Layer.

  • R80.XX gateways are managed separately, based on the R80 or higher Policy Layers. (see Threat Prevention Policy Layers).

Best Practice - For better performance, we recommend that you use the Optimized profile when you upgrade to R80 or higher from earlier versions.

Threat Prevention Rule Base

Each Threat Prevention Layer contains a Rule Base. The Rule Base determines how the system inspects connections for malware.

The Threat Prevention rules use the Malware database and network objects. Security Gateways that have Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. enabled can also use Access Role objects as the Protected Scope in a rule. The Access Role objects let you easily make rules for individuals or different groups of users.

There are no implied rules in this Rule Base, traffic is allowed or not allowed based on how you configure the Rule Base. For example, A rule that is set to the Prevent action, blocks activity and communication for that malware.

Parts of the Rules

The columns of a rule define the traffic that it matches and what is done to that traffic.

Number (No.)

The sequence of rules is important because the first rule that matches traffic according to a protected scope (see Protected Scope) and profile is applied.

For example, if rules 1 and 2 share the same protected scope and a profile in rule 1 is set to detect protections with a medium confidence level and the profile in rule 2 is set to prevent protections with a medium confidence level, then protections with a medium confidence level will be detected based on rule 1.

Name

  1. Give the rule a descriptive name. The name can include spaces.

  2. Double-click in the Name column of the rule to add or change a name.

  3. Click OK.

Protected Scope

Threat Prevention rules include a Protected Scope parameter. Threat Prevention inspects traffic to and/or from all objects specified in the Protected Scope, even when the specified object did not open the connection. This is an important difference from the Source object in Firewall rules, which defines the object that opens a connection.

For example, the Protected Scope includes a Network ObjectClosed Logical object that represents different parts of corporate topology - computers, IP addresses, traffic protocols, and so on. Administrators use these objects in Security Policies. named "MyWebServer". Threat Prevention inspects all files sent to "MyWebServer" for malware threats, even if "MyWebServer" did not open the connection.

For more details on the various types of objects, see the R81 Security Management Administration Guide.

You can set the Protected Scope parameter to Any. This option lets Threat Prevention inspect traffic based on the direction and interface type as defined by the Profile assigned to the applicable rule. By default, the predefined Optimized Rule sets the Protection Scope to Any.

Traffic Direction and Interface Type Settings

You can configure the traffic direction and Security Gateway interface types that send files to Threat Prevention for inspection. You do this in the Protected Scope section of the Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV. or Threat Emulation Settings window.

When you select the Any option in the Protected Scope section of a rule, the traffic direction and interface type are defined by the Profile assigned to that rule. If you add objects to the Protected Scope in a rule, files that match these objects are inspected for all connections.

Using Protected Scope with SPAN and TAP Configurations

The default global parameter for SPAN and TAP configuration is set to inspect all. You can use these commands to configure the Security Gateway to use the Protected Scope settings for SPAN and TAP with Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE..

  • The "fw ctl set int" command - Changes current Protected Scope settings for SPAN and TAP, does not survive reboot

  • The $FWDIR/module/fwkern.conf file - This changes the settings after reboot.

Run these commands to set the SPAN port to use the Policy instead of the global default setting (inspect all)

# fw ctl set int te_handle_span_port_interfaces_according_to_topolgy 1

# echo "te_handle_span_port_interfaces_according_to_topolgy=1" >> $FWDIR/boot/modules/fwkern.conf

Limitations and Troubleshooting

  • If no topology is defined for the Security Gateway interfaces, all traffic is inspected or sent for emulation.

  • When you upgrade from R76 or lower, the Inspect incoming files option is set to All by default.

  • When the topology of the interfaces is defined and you are using SPAN or TAP modes, it is possible that some of the connections are not defined correctly.

Protection

The Protection/Site column shows the protections for the Threat Prevention policy.

  • For rules, this field is always set to n/a and cannot be changed. Protections for Rule Base rules are defined in the configured profile (in the Action column).

  • For rule exceptions and exception groups, this field can be set to one or more specified protections.

Action

Action refers to how traffic is inspected.

  • For rules, this is defined by the profile. The profile contains the configuration options for different confidence levels and performance impact (see Profiles Pane).

  • For rule exceptions and exception groups, the action can be set to Prevent or Detect.

Threat Prevention Track Options

Install On

  1. Select the Security Gateways, on which to install the rule. The default is All (all Security Gateways that have a Threat Prevention blade enabled).

  2. Put your mouse in the column and a plus sign shows.

  3. Click the plus sign to open the list of available Security Gateways and select the applicable Security Gateway.

If you right-click a column in the table, you can add more columns to the table from the list that shows.