Getting Started with Custom Threat Prevention

You can configure Threat Prevention to give the exact level of protection that you need, or you can decide to use the out-of-the-box configuration.

  1. Enable Custom Threat Prevention Software Blades in the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. object.

  2. Optional: Create your Custom Threat Prevention profiles based on the default Custom Threat Prevention profiles.

    See Threat Prevention Profiles.

  3. Optional: Configure advanced Threat Prevention settings:

    • Security Gateway / Cluster object - Settings for Threat Prevention Software Blades and features.

    • Security Policies view > Threat Prevention > Exceptions

    • Security Policies view > Threat Prevention > click Custom Policy > refer to the Custom Policy Tools section

    • Security Policies view > HTTPS Inspection

    • Manage & Settings view > Blades > Threat Prevention > Advanced Settings

    • Security Gateway / each Cluster Member command line - Configuration commands and files (for example, for SSH Deep Inspection)

  4. Configure the Custom Threat Prevention policy.

  5. Install the Custom Threat Prevention policy.

Note - Most traffic is HTTPS rather than HTTP. Therefore, to maximize the effectiveness of the Threat Prevention Software Blades, we recommend to also enable HTTPS InspectionClosed Feature on a Security Gateway that inspects traffic encrypted by the Secure Sockets Layer (SSL) protocol for malware or suspicious patterns. Synonym: SSL Inspection. Acronyms: HTTPSI, HTTPSi.. See HTTPS Inspection

Disabling the Threat Prevention Blades

When you disable all the Threat Prevention Software Blades in a Security Gateway object, you must click the "Install Policy" button and then click the "Uninstall Threat Prevention Policy" link.

Monitoring

Use the Logs & Events page to show logs related to Threat Prevention traffic. Use the data there to better understand the use of these Software Blades in your environment and create an effective Rule Base. You can also directly update the Rule Base from this page.

You can add more exceptions that prevent or detect specified protections or have different tracking settings.