User Manual Part 2

Table Of Contents
Overview
410 Check Point Safe@Office User Guide
Chapter 14
This chapter explains how to use Check Point SmartDefense Services.
This chapter includes the following topics:
Overview..................................................................................................410
Configuring SmartDefense.......................................................................41
1
SmartDefense Categories .........................................................................41
9
Resetting SmartDefense to its Defaults
....................................................464
Overview
The Safe@Office appliance includes Check Point SmartDefense Services, based on Check
Point Application Intelligence. SmartDefense provides a combination of attack safeguards
and attack-blocking tools that protect your network in the following ways:
Validating compliance to standards
Validating expected usage of protocols (Protocol Anomaly Detection)
Limiting application ability to carry malicious data
Controlling application-layer operations
In addition, SmartDefense aids proper usage of Internet resources, such as FTP, instant
messaging, Peer-to-Peer (P2P) file sharing, file-sharing operations, and File Transfer
Protocol (FTP) uploading, among others.
Using SmartDefense