What's New in R82.10
Introduction
Enterprises are rapidly adopting AI to achieve impressive productivity gains. However, AI systems also introduce unprecedented new security challenges. Traditional detection and response frameworks are no longer enough to protect today’s distributed, hybrid mesh networks. It is imperative that enterprises shift left to prevention-first security. R82.10 enables security for the AI transformation, Hybrid Mesh Network, and advanced threats.
R82.10 delivers stronger threat prevention, higher scalability & performance, and greater operational simplicity.
Architectural Updates: R82.10 features an upgraded OS based on Linux kernel 5.14 versus 4.xx in previous releases. This release runs exclusively in UPPAK mode (User Space Performance Pack).
Stronger Threat Prevention
-
Threat Prevention Insights: Provides administrators with clear insights into the effectiveness and coverage of Threat Prevention and IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System)., featuring visualizations, metrics, and recommendations to refine rules and profiles.
-
Advanced Zero Phishing: Zero Phishing
Check Point Software Blade on a Security Gateway (R81.20 and higher) that provides real-time phishing prevention based on URLs. Acronym: ZPH. Software Blade
Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. now protects encrypted traffic from phishing attacks at the domain level - enabling domain analysis by ThreatCloud
The cyber intelligence center of all of Check Point products. Dynamically updated based on an innovative global network of threat sensors and invites organizations to share threat data and collaborate in the fight against modern malware. AI without requiring SSL Inspection or decryption.
-
Protection from HTML Smuggling: Zero Phishing Software Blade introduces a powerful new capability to detect and block HTML smuggling, an advanced cyberattack technique that avoids firewall detection by building malware locally within a target's web browser.
-
Expanded DNS Protection: Introduces DNS-over-TLS threat prevention to block malicious DNS activity over encrypted channels.
-
Hardened Encryption: HTTPS Inspection
Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi. now supports Hardware Security Module (HSM) for TLS 1.3, making it considerably harder for attackers to compromise encrypted traffic.
-
MCP Detection and Visibility: Introduces MCP (Model Context Protocol) detection and visibility to ensure that only authorized MCP communications are allowed across the network.
-
Enhanced Drop Templates: New drop templates improve resilience by reducing CPU usage to enable blocking a much higher volume of denial of service (DoS) attacks while maintaining maximum throughput for permitted traffic.
-
4 New ThreatCloud AI Engines: PDF security with advanced image and text analysis, malicious GitHub-hosted account and repository detection, automatic creation of file and IPS protection rules, and a new web security model with enhanced decision-making capabilities.
-
Adaptive IPS: A new optimized IPS defense profile is tailored to fit an organization’s exact requirements. This enables IPS to be turned on with minimal CPU performance impact, for improved resiliency and threat detection.
Scalability & Performance
-
Scalable Identity Management: Improved identity awareness across the enterprise for unified policy enforcement and scalable identity sharing.
-
Each Policy Decision Point (PDP
Check Point Identity Awareness Security Gateway that acts as Policy Decision Point: acquires identities from identity sources; shares identities with other gateways.) can now manage up to 1M identities, reducing the number of required PDPs by up to 5X. -
A single PDP can share identities with up to 300 Policy Enforcement Point (PEP
Check Point Identity Awareness Security Gateway that acts as Policy Enforcement Point: receives identities via identity sharing; redirects users to Captive Portal.) gateways, even across multiple domains. -
Direct PDP to PEP sharing works across Multi-Domain Security Management without an Identity Broker
Identity Sharing mechanism between Identity Servers (PDP): (1) Communication channel between PDPs based on Web-API (2) Identity Sharing capabilities between PDPs - ability to add, remove, and update the identity session., simplifying configuration.
-
-
Support for SD-WAN in Maestro Security Groups: Enables higher scalability in branch office networks while providing the highest system reliability and redundancy.
-
Quantum Security Management Scalability: Increases the maximum number of managed Security Gateways to 1,500 per management domain. Users can further scale to 10,000 gateways in a Multi-Domain Security Management Server configuration.
Operational Simplicity
-
Centralized Identity Management: Infinity Identity is a cloud service that integrates with Quantum network security, provides the option of integrating with multiple identity providers, and eliminates the need for separate management portals. It integrates endpoint device and device security posture data from Microsoft Intune, Microsoft Defender, CrowdStrike Falcon, Harmony Endpoint, and more for consistent and unified zero-trust access control.
-
New Access Policy Log Generation Modes: New logging mode enables streamlined control over daily log output, with improved granularity into log levels and analytics on high-volume rules. The Aggregated mode greatly reduces daily log volume by up to 70%, reducing storage needs accordingly.
-
Simplified Route-Based VPN: Automatically configures Site to Site VPN
An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN. based on network topology, enabling one-click setup and dynamic routing with BGP. -
Enhanced Web-based UI: New web-based UI allows users to manage common security use cases from the web for more flexibility.
Threat Prevention
Threat Prevention Insights
-
Provides clear insight into Threat Prevention and IPS effectiveness and coverage, with visualizations, metrics, and recommendations to refine policy and profiles. A tuned policy enhances coverage, reduces noise, and maintains Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. performance predictable and manageable.Key Features:
-
Misconfigurations & Optimizations:
-
Detects misconfigured IPS profile for example, disabled protections, conflicting exceptions, and outdated profiles).
-
Surfaces overly permissive settings and hitless items, with guidance to remediate safely.
-
Prioritizes changes by security impact and performance benefit.
-
-
IPS Profile Tuning:
-
Highlights noisy signatures, false-positive candidates, and protections generating excessive logs.
-
Suggests severity-aware tuning (move to Detect
UserCheck rule action that allows traffic and files to enter the internal network and logs them./Prevent
UserCheck rule action that blocks traffic and files and can show a UserCheck message., adjust performance impact, add targeted exceptions) to cut noise while preserving critical coverage.
-
-
Zero Phishing
-
Zero Phishing Software Blade provides prevention for customers without HTTPS Inspection, utilizing Server Name Indication (SNI) in TLS handshake.
-
Zero Phishing Software Blade introduces a powerful new capability to detect and block HTML Smuggling, a technique used by threat actors to bypass traditional Network Threat Prevention systems.
ThreatCloud AI Engines
- Threat Emulation PDF Engine
The updated PDF engines combine advanced image and text analysis.
-
Image analysis: QR code extraction, page-layout parsing, brand misuse detection resilient to adversarial obfuscation, and adult-content heuristics.
-
Text analysis: an SLM (Small Language Model) flags social-engineering patterns in forms, lures, and conversational tone.
-
Brand detection: adversarial image obfuscation techniques.
-
-
GitHub Abuse Engine - Designed to detect malicious GitHub-hosted accounts and repositories used for credential theft and drive-by malware downloads. The engine uses advanced algorithms and AI to analyze user behavior, repository structure, key files, and JavaScript content through deep code inspection.
-
AI Web Security (New model) - The latest version of the AI web security engine features enhanced decision-making capabilities across web traffic by combining DNS metadata, certificate attributes, and behavioral signals.
-
Generative AI Protections Engine - Automates the creation of File and IPS protection rules by processing open-source intelligence and ThreatCloud traffic. It generates protection rules automatically, eliminating manual effort and accelerating the protection delivery. By reducing analysis time from days to hours, it enhances threat response and expands coverage with minimal human intervention.
DNS Security
-
Introducing DoT (DNS over TLS) - Threat Prevention capabilities for malicious DNS activity over the TLS protocol.
HTTPS Inspection
-
Added support for the hybrid PQC-safe key exchange group "X25519MLKEM768" (combining X25519 and ML-KEM768 algorithms) within HTTPS Inspection.
-
HTTPS Inspection now supports Hardware Security Module (HSM) integration for TLS 1.3, ensuring secure storage and management of private keys during encrypted traffic inspection.
-
Rule Base Hit Count is now available for HTTPS Inspection policies, improving visibility and administrative control.
IPS
-
New capability that automatically detects and remediates CPU-intensive IPS protections with a dedicated SmartView dashboard displaying IPS bypass statistics and CPU-intensive protection insights.
Quantum Security Gateway
Identity Awareness
-
Introducing Scalable Identity Sharing that allows more flexible and efficient identity distribution with two major enhancements:
-
Scalable Identity management: A single Policy Decision Point (PDP) gateway can now distribute identities to up to 300 Policy Enforcement Point (PEP) gateways, significantly improving scalability and performance.
-
Cross-Management Domain Support: Identities can now be seamlessly shared across multiple Domain Management Servers
Virtual Security Management Server that manages Security Gateways for one Domain, as part of a Multi-Domain Security Management environment. Acronym: DMS. (CMAs), enabling unified and consistent identity-based policy enforcement throughout large and distributed environments.
-
-
Improved PDP Performance - Policy Decision Point (PDP) gateways can now handle up to 1 million identities each, leveraging a new multi-process architecture that optimizes hardware utilization and boosts overall performance.
-
Quantum Security Gateway integration with Infinity Identity - Seamless integration with Infinity Identity, delivering centralized and unified Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. policy enforcement throughout the entire network infrastructure, and supports new identity integrations such as Microsoft Intune, Microsoft Defender, and Harmony Endpoint.
URL Filtering
-
The URL Filtering
Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. Software Blade now supports automatic categorization of websites listed in the "Terrorism" category of the CTIRU (Counter-Terrorism Internet Referral Unit) list.
Site to Site VPN
-
Added support for standard ML-KEM as required by the FIPS 203 standard to address Post-Quantum Cryptography (PQC). See sk184080 - Post-Quantum Cryptography (PQC) algorithms in R82.10 and higher.
-
Simplified Route-based VPN - Automatically configures route-based VPNs on Check Point Security Gateways based on network topology, providing easy, one-click setup and saving configuration time. It also includes support for dynamic routing using BGP.
SD-WAN
-
Added support for SD-WAN
Software Defined – Wide Area Network (WAN), more information on this solution:
https://www.checkpoint.com/cyber-hub/network-security/what-is-sd-wan/ in Maestro Security Groups
A logical group of Security Appliances (in Maestro) / Security Gateway Modules (on Scalable Chassis) that provides Active/Active cluster functionality. A Security Group can contain one or more Security Appliances / Security Gateway Modules. Security Groups work separately and independently from each other. To the production networks, a Security Group appears a single Security Gateway. In Maestro, each Security Group contains: (A) Applicable Uplink ports, to which your production networks are connected; (B) Security Appliances (the Quantum Maestro Orchestrator determines the applicable Downlink ports automatically); (C) Applicable management port, to which the Check Point Management Server is connected.. See sk180605 - Quantum SD-WAN.
Security Gateway Enhancement
-
New MCP Detection and Visibility feature designed to monitor and manage Model Context Protocol (MCP) traffic within your network. You can now instantly access detailed information about MCP traffic, including server names, versions, and tools in use. In addition to enhanced visibility, this feature empowers you to accept or drop MCP connections based on your organization's security policies
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.. This gives you greater control over your network traffic and helps ensure only authorized MCP communications are allowed. -
Redesigned the Drop Optimization feature in Access Control policy. The new design supports more acceleration use cases, such as rules with Dynamic Objects and future offloads the traffic to ASIC-powered network cards. See sk184356 - Firewall Drop Optimization in R82.10 and higher.
Dynamic Routing
-
Added support for these Dynamic Routing features:
-
Support for up to 256 PIM interfaces, which allows greater flexibility and scalability in network configurations.
-
Support for up to 500 BGP peers, ensuring robust and efficient routing capabilities.
-
Support for BGP Large Communities, which provides enhanced control and management of routing policies across multiple networks.
-
Cluster and Scalability
-
The ElasticXL clustering and Maestro Security Group now support SecureXL
Check Point product on a Security Gateway that accelerates IPv4 and IPv6 traffic that passes through a Security Gateway. in the User Mode (UPPAK).
Internal CA
-
Increased RSA Key Size for Internal CA – The default RSA key size for the Root CA has been increased from 2048 bits to 3072 bits, enhancing cryptographic security for Internal CA, SIC
Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server., Site to Site VPN, Remote Access VPN
An encrypted tunnel between remote access clients (such as Endpoint Security VPN) and a Security Gateway. clients, user certificates, and Multi-Portal certificates.-
In the clean installation, this is the default.
-
In the upgraded installation, this is the new default if you remove the current Internal CA and create the new Internal CA.
-
Gaia OS Security
-
In Gaia Clish
The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell)., you can configure the number of hashing rounds for new passwords.Hashing rounds determine the number of iterations a hashing algorithm performs on a password before storing it. This process is used to enhance security by making it more computationally expensive for attackers to crack passwords through brute force attacks.
-
Added the Bcrypt hash for password encryption of local users in the Gaia
Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. OS. -
External RADIUS authentication servers can now be configured to use CHAP (Challenge-Handshake Authentication Protocol) or PAP (Password Authentication Protocol).
Quantum Security Management
Logging and Monitoring
-
New Access Policy Log Generation Modes: Standard and Aggregated. The Aggregated mode significantly reduces the daily log volume.
-
The Log Forwarding feature is now easier to use. It now forwards locally stored logs to the primary Log Server
Dedicated Check Point server that runs Check Point software to store and process logs. without requiring a specific Log Server to be selected. The feature is enabled by default for new Gateways, making sure that locally stored logs will automatically upload to the Log Server. -
Additional logging enhancements in SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.:-
View the rules log level by hovering over the Track column in the Access Control rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session.. -
Added the ability to customize the default Track value for new Access Control rules.
-
Enhanced the session log content with additional fields, including NAT details.
-
Introducing the per-session log level control for Implied Rules.
-
Compliance
-
Added support for new regulations:
-
CSA CCoP 2.0
-
DORA 2023
-
ISO 27002 2022
-
NIST800-82r3
-
-
Added new Management API commands for initiating new scans, showing Best Practices data, Compliance
Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. settings, and more. -
Update existing Best Practices for Firewall, IPS, Anti-Bot
Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT., and VPN Software Blades.