We are happy to announce the new Autonomous Threat Prevention Management
A whole new way to manage your Threat Prevention Security Gateways
Single Click Configuration - The administrator just needs to choose one of the predefined types of networks for the Security Gateways to protect (Perimeter, Data Center East-West, Internal Network, Guest Network, Strict Security).
Automatic Configuration Updates - Check Point automatically updates the profile and the customers automatically enjoy new features, advanced protections enabled (based on research and ongoing attacks) and other best practices.
Streamlines configuration and deployment of policy profiles across your Security Gateways.
Provides simple and powerful customization to serve your organization's needs.
Zero day-to-day maintenance required from the administrator, while maintaining optimal security.
Customers who do not have time to handle Threat Prevention configuration
Customers who do not know how to configure Threat Prevention and want to be more secured
Customers who would like their Threat Prevention configuration to always be up to date
A short video:
Note - In R81.10 Infinity Threat Prevention was renamed to Autonomous Threat Prevention.
Can Customers/Check Point Personnel Enable it on their Own?
YES - Autonomous Threat Prevention is already available in:
R80.40 - See the instructions below (available only in the Early Availability mode).
Assign the permissions to the script: chmod +x installItpDarwin.sh
In the GW_PKG folder, run this script: ./installItpDarwin.sh --local $(pwd)
When finished, the script shows 'Finished'.
Install the required Autonomous Threat Prevention packages on the Management Server:
Copy the packages to the Security Management Server and put them in a new folder (name it MGMT_PKG).
Download the installItpDarwin.sh script and transfer it to the MGMT_PKG folder.
On the Security Management Server, assign permissions to the script: chmod +x installItpDarwin.sh
In the MGMT_PKG folder, run this script: ./installItpDarwin.sh --local $(pwd)
When finished, the script shows 'Finished' and a list of the installed packages.
In SmartConsole, in the Threat Prevention profile, you will see Autonomous Threat Prevention.
Enable the Autonomous Threat Prevention in the applicable Security Gateway / Cluster object:
In SmartConsole, go to Gateways & Servers, double-click the Security Gateway / Cluster object.
Go to the Threat Prevention pane (right-lower section of the window) and select Autonomous Threat Prevention.
Create an Autonomous Threat Prevention policy (if you already have a Threat Prevention policy package, skip to Step 5):
In SmartConsole, go to the main Menu and select Manage policies and layers.
The Manage policies and layers window opens.
Click New - the New Policy window opens.
Enter a name for the policy package.
On the General page > Policy types section, select Threat Prevention (you can select more policy types if required).
In SmartConsole, go to Security Policies > Autonomous Threat Prevention > Policy.
From the drop-down list of the pre-defined profiles, select the required profile.
Install the Autonomous Threat Prevention policy:
In SmartConsole, click Install policy.
Select Threat Prevention.
Select the applicable Security Gateway / Cluster object.
Note: The Autonomous Threat Prevention policy will be installed on Security Gateways with Infinity Threat Prevention enabled. Security Gateways without Infinity Threat Prevention enabled will receive the Custom (Traditional) Threat Prevention Policy.
Verify the policy is enforced - download a malicious file through the Security Gateway. Security Gateway must block this download and generate a corresponding log.
Give us Feedback
Thanks for your feedback!
Are you sure you want to rate this stars?