This detailed guide will help you understand Custom Threat Protection, focusing on Intrusion Prevention System (IPS), SandBlast features, Anti-Bot and Anti-Virus, and IoT Security.
The Intrusion Prevention System (IPS) is a critical component of Check Point’s threat prevention suite. It detects and blocks malicious traffic based on attack signatures and behavioral analysis.
Understanding Attack Signatures:
How to Tune IPS:
Example Use Case:
What are IPS Profiles?
How to Apply an IPS Profile:
Performance Tips:
SandBlast is Check Point’s advanced threat prevention technology, designed to protect against zero-day threats. It includes two key features:
Enable Threat Emulation:
Example Workflow:
Enable Threat Extraction:
How It Works:
Example Use Case:
Anti-Bot prevents malware from communicating with its command-and-control (C&C) servers, effectively neutralizing threats that have already infiltrated the network.
Enable Anti-Bot Protection:
Advanced Configuration:
Example Workflow:
Enable Anti-Virus Protection:
Best Practices:
Example Use Case:
IoT devices often lack robust security features, making them attractive targets for attackers. Check Point’s IoT protection framework secures these devices and prevents them from being exploited.
Discover IoT Devices:
Apply IoT-Specific Protections:
What is Micro-Segmentation?
How to Implement:
Example Use Case:
Check Point provides several useful commands to monitor and troubleshoot IPS:
ips stat
Displays the current status of the IPS Blade, including whether it's enabled, profile used, and last update time.
ips update status
Checks the update status of the IPS signature database. Useful for verifying whether protections are current and synced with ThreatCloud.
| Feature | SecureXL / Fast Path |
|---|---|
| Stateless traffic | Accelerated |
| Lightweight IPS signatures | Some supported |
| Complex IPS protections | Slow path (CPU) |
| HTTPS-inspected traffic | Handled in software |
Best Practice:
Use the Optimized Profile in production and activate Strict Profile only in high-risk zones.
Threat Emulation can operate in the following modes:
| Mode | Description |
|---|---|
| Cloud-Based | Files sent to Check Point’s cloud sandbox (ThreatCloud) |
| On-Prem (TE Appliance) | Local sandboxing using dedicated hardware or VM |
| Hybrid | Priority to local; fallback to cloud if unavailable |
Configuration Path:
SmartConsole > Threat Prevention > Threat Emulation Settings
Files are analyzed based on how they are transferred. Supported traffic paths include:
Ensure the Threat Prevention Blade is applied to the relevant network zones and protocols.
Threat Emulation only analyzes structured, executable content:
| File Type | Emulated? |
|---|---|
| .exe, .pdf, .doc | Yes |
| .zip, .rar | Yes |
| .jpg, .png | No |
| .mp3, .mp4 | No |
Files like images or media are not emulated, even if they’re sent via supported protocols.
tecli show status
Shows the current operational status of Threat Emulation services.
tecli show files
Lists files currently under analysis, including their verdict and source.
These tools are helpful for confirming whether files are reaching the sandbox engine and how quickly they're processed.
Check Point provides two distinct AV modes:
| Mode | Description |
|---|---|
| Anti-Virus Blade | Modern engine, integrated with ThreatCloud for real-time detection and C&C blocking |
| Traditional Anti-Virus | Legacy mode, less effective, only used in very old environments |
Best Practice:
Always use the modern Anti-Virus Blade unless compatibility requires traditional AV.
When combined with Identity Awareness, IoT security becomes more context-aware:
Check Point supports integration with:
Integration Benefits:
Example:
A building’s access control system can’t talk to the guest Wi-Fi VLAN.
| Scenario Type | Valid for Exams? | Justification |
|---|---|---|
| High-risk zones with IPS Strict Profile | Yes | Matches best practices; often asked in CCSE scenario items |
| Sandbox protection in healthcare | Yes | Good use of TE with medical file scanning via SMB/SMTP |
| IoT micro-segmentation with VLANs | Yes | Ideal for case-study or network diagram-based questions |
| Category | Supplemented Insight |
|---|---|
| IPS CLI | ips stat, ips update status |
| IPS & Acceleration | Certain IPS bypass SecureXL/CoreXL → handled in slow path |
| SandBlast Deployment | Local vs. cloud vs. hybrid sandboxing |
| File Types for Emulation | Only executable/structured types are emulated |
| AV CLI | tecli show status, tecli show files |
| Anti-Virus Modes | Modern AV vs. Traditional AV (legacy distinction) |
| IoT Integration | Identity-aware IoT tagging, controller integration (IoT Protect) |
| Micro-Segmentation | VLAN-based control + contextual access enforcement |
Why might Threat Prevention block legitimate application traffic in a production environment?
Threat Prevention signatures may detect patterns that resemble known attack behaviors.
Threat Prevention engines such as IPS analyze network traffic patterns to identify potential attacks. Some application traffic may contain data patterns similar to known exploit signatures, causing the system to classify the traffic as malicious even when it is legitimate. This situation is referred to as a false positive. When this occurs, administrators typically review the triggered protection signature, analyze the affected traffic, and determine whether the detection is valid. If the traffic is legitimate, administrators may adjust the protection settings, create exceptions, or modify the Threat Prevention profile to prevent unnecessary blocking while maintaining security coverage.
Demand Score: 87
Exam Relevance Score: 84
How can administrators reduce false positives when using IPS protections?
By tuning IPS profiles and adjusting protection actions based on risk assessment.
IPS protections are organized into profiles that determine how individual protections behave. Each protection can be configured with actions such as detect, prevent, or inactive. Administrators can review triggered protections in logs and determine whether they represent real threats or false positives. If a protection repeatedly blocks legitimate traffic, administrators may change its action from prevent to detect or create specific exceptions for trusted traffic patterns. Careful tuning allows organizations to maintain strong intrusion protection while minimizing operational disruption caused by overly aggressive detections.
Demand Score: 84
Exam Relevance Score: 83
Why is it important to use different Threat Prevention profiles for different network environments?
Different environments require varying security sensitivity and performance considerations.
Not all network segments require identical security inspection levels. For example, internet-facing servers may require stricter intrusion prevention policies, while internal trusted networks may require less aggressive inspection to avoid disrupting business applications. Using multiple Threat Prevention profiles allows administrators to apply appropriate inspection policies depending on the network context. This approach ensures that high-risk traffic receives stronger protection while maintaining operational stability in internal environments. Tailoring inspection policies to different segments helps balance security effectiveness with network performance.
Demand Score: 80
Exam Relevance Score: 82
What operational step should administrators take when a new Threat Prevention signature update is deployed?
Monitor logs and alerts to verify that the new protections do not disrupt legitimate traffic.
Threat Prevention signatures are regularly updated to detect newly discovered vulnerabilities and attack techniques. While these updates improve security coverage, they may also introduce protections that incorrectly classify legitimate traffic as malicious. After applying signature updates, administrators typically monitor security logs and alert dashboards to identify any unexpected blocks or application disruptions. If issues arise, the affected protections can be adjusted or temporarily set to detect mode while further analysis is conducted. Continuous monitoring ensures that updated protections strengthen security without negatively affecting business operations.
Demand Score: 77
Exam Relevance Score: 81