Security Elevation

Application Control and Content Filtering

Concept

Any kind of traffic that you can label based off pf the destination address/traffic (e.g. Facebook) is an application.

This can be used to block inappropriate, malicious, or time-wasting traffic.

URL Filtering

This is a process that lets companies restrict online content that individuals can access. Users are prevented from going to specific websites and prohibited from using corporate resources such as bandwidth or devices in a way that could harm the company

Employee data is kept private when attempting to determine a site category. Only part of the URL is logged. The data is also encrypted

URL Filtering DB Categories

  • Blocked sites

  • Allowed Sites

  • Defined IT Policies

  • Blocked or Allowed URL Filtering

If there isn't an entry for a URL in the local database, the Firewall will check with Check Points Cloud to see it's reputation

There are two options while waiting for the response:

  • Allow all requests (fail-open)

  • Disallow all requests

Autonomous Threat Prevention

Provides out-of-the-box Threat Prevention, which reduces administrative overhead

Primary capabilities:

Threat Prevention Profiles include:

The Sandbox prevents unknown zero-day and sophisticated attacks by executing suspicious files in evasion-resistant sandbox and uses AI techniques

Advanced Forensic Details

Some logs contain additional fields that hold information that can be used for advanced forensic analysis of the traffic that triggered a protection. The following protocols are supported:

  • DNS

  • FTP

  • HTTP

  • HTTPS

  • SMTP

Practice Questions

Last updated

Was this helpful?