User guide

Overview
Chapter 14: Using SmartDefense 449
Chapter 14
This chapter explains how to use Check Point SmartDefense Services.
This chapter includes the following topics:
Overview .................................................................................................. 449
Configuring SmartDefense ....................................................................... 450
SmartDefense Categories ......................................................................... 458
Resetting SmartDefense to its Defaults .................................................... 503
Overview
The Safe@Office appliance includes Check Point SmartDefense Services, based on Check
Point Application Intelligence. SmartDefense provides a combination of attack safeguards
and attack-blocking tools that protect your network in the following ways:
Validating compliance to standards
Validating expected usage of protocols (Protocol Anomaly Detection)
Limiting application ability to carry malicious data
Controlling application-layer operations
In addition, SmartDefense aids proper usage of Internet resources, such as FTP, instant
messaging, Peer-to-Peer (P2P) file sharing, file-sharing operations, and File Transfer
Protocol (FTP) uploading, among others.
Using SmartDefense