Security Elevation
Application Control and Content Filtering
Concept
Any kind of traffic that you can label based off pf the destination address/traffic (e.g. Facebook) is an application.
This can be used to block inappropriate, malicious, or time-wasting traffic.
URL Filtering
This is a process that lets companies restrict online content that individuals can access. Users are prevented from going to specific websites and prohibited from using corporate resources such as bandwidth or devices in a way that could harm the company
URL Filtering DB Categories
Blocked sites
Allowed Sites
Defined IT Policies
Blocked or Allowed URL Filtering
If there isn't an entry for a URL in the local database, the Firewall will check with Check Points Cloud to see it's reputation
There are two options while waiting for the response:
Allow all requests (fail-open)
Disallow all requests
Autonomous Threat Prevention
Provides out-of-the-box Threat Prevention, which reduces administrative overhead
Primary capabilities:
Threat Prevention Profiles include:
Advanced Forensic Details
Some logs contain additional fields that hold information that can be used for advanced forensic analysis of the traffic that triggered a protection. The following protocols are supported:
DNS
FTP
HTTP
HTTPS
SMTP
Practice Questions
Last updated
Was this helpful?