
Configuring Threat Extraction Settings.................................................................... 191
Configuring a Malware DNS Trap............................................................................. 192
Exception Rules ...................................................................................................... 193
The Check Point ThreatCloud...................................................................................195
Updating IPS Protections......................................................................................... 196
Threat Prevention Scheduled Updates..................................................................... 197
Updating Threat Emulation...................................................................................... 197
To Learn More About Threat Prevention .................................................................197
Creating Shared Policies ..............................................................................................198
Shared Policies .........................................................................................................198
Configuring HTTPS Inspection .................................................................................199
Inspecting HTTPS Packets....................................................................................... 199
Configuring Gateways to inspect outbound and inbound HTTPS................................ 200
Configuring the Geo Policy .......................................................................................208
Adding Users to the Policy............................................................................................210
Using Identity Awareness .........................................................................................210
Identity Sources...................................................................................................... 210
Enabling Identity Awareness ................................................................................... 211
Creating Access Roles............................................................................................. 212
Using Identity Awareness in the Access Control Policy............................................. 213
Redirecting to a Captive Portal ................................................................................ 214
Sample Identity Awareness Rules............................................................................ 214
Using User Directory ................................................................................................216
User Directory Features.......................................................................................... 216
Deploying User Directory ........................................................................................ 216
Account Units.......................................................................................................... 217
Working with LDAP Account Units ........................................................................... 217
Enabling User Directory .......................................................................................... 220
Managing LDAP Information.................................................................................... 220
To Learn More About Adding Users to the Policy....................................................221
Logging and Monitoring ................................................................................................222
Log Analysis ..............................................................................................................223
Configuring Logging................................................................................................ 223
Enabling Log Indexing............................................................................................. 225
Sample Log Analysis............................................................................................... 226
Tracking Options..................................................................................................... 227
Log Sessions........................................................................................................... 229
Views and Reports ....................................................................................................230
Enabling Views and Reports .................................................................................... 231
Catalog of Views and Reports .................................................................................. 231
Views...................................................................................................................... 232
Reports................................................................................................................... 232
Automatic View and Report Updates ........................................................................ 234
Opening a View or Report ........................................................................................ 235
Exporting Views and Reports................................................................................... 235
Scheduling a View or Report.................................................................................... 236
To Learn More About Logging and Monitoring ........................................................236
Maximizing Network Performance and Redundancy ..................................................238
Solutions for Enhancing Network Performance and Redundancy .........................238
CoreXL .......................................................................................................................238
Configuring CoreXL................................................................................................. 239
To Learn More About CoreXL................................................................................... 239