Getting Started with ICAP Server

To enable ICAP Server support on the Security Gateway / Cluster:

Step

Instructions

1

2

Configure the ICAP client to connect to the Gateway. See Getting Started with ICAP Client.

3

4

For Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX. support, in the Threat Prevention profile editor, go to Threat Extraction > General page > Protocol > select Web (HTTP/HTTPS).

5

To scan files with Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV., in the Threat Prevention profile, go to the Anti-Virus page, and select Enable deep inspection scanning (impacts performance).

6

7

Install the Threat Prevention policy.

For information on how to test ICAP Server functionality, see sk174487.