Show the Entire Article
Availability | Released Takes | List of resolved issues
Autonomous Threat Prevention Management (ATPM):
- New Threat Prevention management, that uses Smart Cyber Policy from the cloud.
- Provides out of the box Threat Prevention profiles based on business & IT security needs
- Easy assignment of policy profile that is tailored to your needs.
- Automatic update of Threat Prevention policy profiles to protect against the latest cyber threats using the latest technologies.
- Zero day-to-day maintenance required from the administrator, while maintaining optimal security. Administrators still have manual configuration capabilities
- GOT_TPCONF_MGMT, GOT_MGMT and DC_INFRA - Management packages
- GOT_TPCONF - a Security Gateway package
Show / Hide Instructions
Note: first, install Check Point R80.40 GA
- Step 1 - Download and install the Autonomous Threat Prevention package GOT_TPCONF on the Security gateway (on cluster, install on each member):
- Copy the Gateway package to the Security Gateway and put it in a new folder (name it
- Download the installItpDarwin.sh script and place it to the
- Give permissions to the script (
chmod +x installItpDarwin.sh)
- In the
GW_PKG folder, run this script:
./installItpDarwin.sh --local $(pwd)
When finished, script shows 'Finished'
- Step 2 - Install 3 Autonomous Threat Prevention packages on the Management server:
- Copy the Management packages to the Security Management Server and put them in a new folder (name it
- Download the installItpDarwin.sh script and upload it to
- On the Security Management Server, give permissions to the script (
chmod +x installItpDarwin.sh)
MGMT_PKG folder, run this script:
./installItpDarwin.sh --local $(pwd).
When finished, script shows 'Finished' and a list of the installed packages.
- In SmartConsole under Threat Prevention profile, you will see Autonomous Threat Prevention
- Step 3 - Enable Autonomous Threat Prevention on a Security Gateway Object:
- In SmartConsole, go to Gateways & Servers, right-click the Gateway and click Edit.
- Go to the Threat Prevention tab (right-lower section of the window) and select Autonomous Threat Prevention.
- Click OK
- Step 4 - Create an Autonomous Threat Prevention policy (if you already have a Threat Prevention policy package, skip to step 5):
- In SmartConsole, go to main Menu and select Manage policies and layers
- The Manage policies and layers window opens
- Click New - the New Policy window opens
- Enter a name for the policy package.
- In the General page > Policy types section, select Threat Prevention (you can select more policy types if required).
- In SmartConsole, go to Security Policies > Infinity Threat Prevention > Policy
- From the drop-down list the 5 pre-defined profiles, select the required profile
- Click Ok
- Step 5 - Install the Autonomous Threat Prevention policy:
- In SmartConsole, from the main menu, select Install policy
- Select Threat Prevention
- Select the your gateways targets for policy installation
Note: The Autonomous Threat Prevention policy will be installed on gateways with Threat Prevention Infinity enabled. Gateways with no Threat Prevention Infinity enabled will receive the traditional Threat Prevention Policy
- Click Install
- Success criteria: Install policy success
- Verify the policy is enforced - download malicious file and verify prevention and correct log generated
List of Resolved Issues and New Features per Update