Check Pointintermediate

How to Enable Threat Prevention Blades in Check Point

Enable and configure Check Point Threat Prevention including IPS, Anti-Bot, Anti-Virus, and Threat Emulation. Learn profiles, policies, and ThreatCloud integration.

14 min readUpdated January 2025

Want us to handle this for you?

Get expert help →

Check Point Threat Prevention provides multi-layered protection against malware, exploits, bots, and advanced threats. The solution includes IPS (Intrusion Prevention System), Anti-Bot, Anti-Virus, Threat Emulation (sandboxing), and Threat Extraction. This guide walks you through enabling and configuring these powerful security blades.

Prerequisites

Before you begin, ensure you have:

  • Security Gateway with Threat Prevention licenses
  • SmartConsole with administrator access
  • Management Server running R80.x or later
  • ThreatCloud connectivity (internet access for threat intelligence updates)
  • Adequate gateway resources (CPU, memory, disk space for threat analysis)
  • Baseline performance metrics to compare before and after enabling blades

Understanding Threat Prevention Blades

BladeDescriptionProtection Type
IPSIntrusion Prevention System - detects and prevents exploitsSignature and behavioral analysis
Anti-BotDetects and blocks botnet communicationCommand & Control detection
Anti-VirusScans files and traffic for malwareSignature and heuristic scanning
Threat EmulationSandboxing for zero-day threat detectionDynamic analysis of suspicious files
Threat ExtractionRemoves active content from documentsContent sanitization (CDR)

Step 1: Enable IPS Software Blade

The IPS blade protects against network-based attacks and exploits:

  1. Open SmartConsole and connect to your Management Server
  2. Navigate to Gateways & Servers
  3. Double-click your Security Gateway object
  4. In General Properties, go to the Network Security tab
  5. Check the box for IPS
  6. A wizard may open - follow the prompts to complete initial setup
  7. Click OK to save the gateway configuration
  8. Click Publish to save changes

IPS Default Behavior

When you enable IPS, a predefined rule is automatically added to the Threat Prevention policy:

  • Protected Scope: Any (all traffic)
  • Profile: Optimized (balanced protection and performance)
  • Action: According to profile settings

Step 2: Enable Anti-Bot and Anti-Virus Blades

These blades work together to detect malware and botnet activity:

  1. Double-click your Security Gateway object
  2. In General Properties > Network Security tab
  3. Check the box for Anti-Bot
  4. The Anti-Bot and Anti-Virus First Time Activation wizard opens
  5. The wizard automatically enables both Anti-Bot and Anti-Virus
  6. Select initial settings:
    • Profile: Optimized (recommended to start)
    • Activation Mode: Prevent or Detect
  7. Click OK to complete the wizard
  8. Click Publish to save changes

Step 3: Enable Threat Emulation (Sandboxing)

Threat Emulation analyzes files in a sandbox to detect zero-day malware:

  1. Double-click your Security Gateway object
  2. In General Properties > Network Security tab
  3. Check the box for Threat Emulation
  4. Configure emulation location:
    • ThreatCloud - Files analyzed in Check Point's cloud (faster, recommended)
    • Local Emulation - Requires dedicated SandBlast appliance
  5. Click OK to save
  6. Click Publish

Threat Emulation Considerations

ConsiderationRecommendation
Emulation LocationThreatCloud for most deployments; local for sensitive data
File TypesConfigure which file types to emulate (executables, documents, archives)
User ExperienceConsider Hold vs. Background modes for file delivery
Evasion ProtectionEnable CPU-level emulation for advanced evasion detection

Step 4: Enable Threat Extraction (Content Disarm)

Threat Extraction removes potentially malicious active content from documents:

  1. Double-click your Security Gateway object
  2. In General Properties > Network Security tab
  3. Check the box for Threat Extraction
  4. Configure extraction settings in the Threat Prevention policy
  5. Click OK to save
  6. Click Publish

Extraction Methods

MethodDescriptionUse Case
Convert to PDFConverts documents to flat PDF formatMaximum security, some formatting loss
CleanRemoves active content, preserves formatBalance of security and usability

Step 5: Configure Threat Prevention Profiles

Profiles determine how each blade responds to threats:

Default Profiles

SmartConsole includes three built-in profiles that cannot be modified:

ProfileDescriptionRecommended Use
OptimizedBalanced protection and performanceGeneral purpose, most environments
StrictMaximum coverage, may impact performanceHigh-security environments
BasicMinimal impact, limited coverageServers, performance-sensitive systems

Creating a Custom Profile

  1. Navigate to Security Policies > Threat Prevention
  2. Click Profiles in the bottom panel
  3. Right-click an existing profile and select Clone
  4. Rename your cloned profile (e.g., "Corporate_Custom")
  5. Double-click to edit the profile

Configuring Profile Settings

In the profile editor, configure each blade:

IPS Settings:

  • General Settings: Configure performance vs. protection balance
  • IPS Policy: Select protections to activate
  • Update Policy: Configure automatic signature updates

Anti-Bot Settings:

  • Confidence Levels: High, Medium, Low
  • Actions: Prevent, Detect, or according to protection
  • Botnet Families: Specific bot types to detect

Anti-Virus Settings:

  • File Types: Which files to scan
  • Archive Handling: Scan depth for compressed files
  • Engine Updates: Signature update frequency

Threat Emulation Settings:

  • File Types: Executables, documents, archives
  • Emulation Environment: OS versions to emulate
  • Evasion Resistance: CPU-level detection settings

Step 6: Create Threat Prevention Policy

The Threat Prevention policy determines which profiles apply to which traffic:

  1. Navigate to Security Policies > Threat Prevention
  2. View the Threat Prevention rule base
  3. Create or modify rules:

Rule Configuration

ColumnDescription
Protected ScopeNetwork objects to protect (hosts, networks, zones)
Protection/Site/File/BladeSpecific protections or categories to apply
ActionPrevent (block), Detect (log only), or According to Profile
ProfileThreat Prevention profile to apply
TrackLogging options
Install OnTarget gateways

Example Rules

Rule 1 - Strict Protection for Servers:

  • Protected Scope: DMZ_Servers group
  • Profile: Strict
  • Action: Prevent
  • Track: Log

Rule 2 - Standard Protection for Users:

  • Protected Scope: Internal_Networks
  • Profile: Optimized
  • Action: Prevent
  • Track: Log

Rule 3 - Detect Mode for Testing:

  • Protected Scope: Test_Network
  • Profile: Optimized
  • Action: Detect
  • Track: Log

Step 7: Configure ThreatCloud Settings

ThreatCloud provides real-time threat intelligence:

  1. Go to Manage & Settings > Blades > Threat Prevention
  2. Click ThreatCloud settings
  3. Configure:
    • Resource Classification: Enable cloud-based file reputation
    • Suspected Websites: Block or warn on suspicious sites
    • Application Database: Enable application identification

Automatic Updates

Configure how often threat data is updated:

  1. Go to Manage & Settings > Blades > Threat Prevention > Updates
  2. Configure:
    • IPS Signatures: Recommended - every 2 hours
    • Anti-Bot/Anti-Virus: Recommended - every 2 hours
    • Threat Emulation: Real-time via ThreatCloud

Step 8: Install Threat Prevention Policy

After configuration, install the policy:

  1. Click Publish to save all changes
  2. Click Install Policy
  3. For IPS changes: Select Access Control policy
  4. For Anti-Bot/Anti-Virus/Threat Emulation: Select Threat Prevention policy
  5. Select target gateways
  6. Click Install
  7. Monitor installation in the Tasks panel

Important: IPS is installed with Access Control policy; other Threat Prevention blades use a separate Threat Prevention policy installation.

Step 9: Monitor Threat Prevention

Real-Time Monitoring

  1. Go to Logs & Monitor in SmartConsole
  2. Select the Threat Prevention view
  3. Monitor:
    • Prevent actions - Threats actively blocked
    • Detect actions - Threats detected but not blocked
    • Protection name - Specific threat identified
    • Severity - Critical, High, Medium, Low

Threat Prevention Dashboard

  1. Go to Logs & Monitor
  2. Click the + tab to open the catalog
  3. Select Threat Prevention dashboard
  4. View:
    • Top attacks by severity
    • Malware trends
    • Blocked applications
    • Bot activity

SmartEvent Integration

For advanced analysis:

  1. Configure SmartEvent server
  2. Enable Threat Prevention events
  3. Access detailed threat analytics and correlations

Troubleshooting Common Issues

High Gateway CPU Usage

Symptoms: CPU spikes after enabling Threat Prevention.

Solutions:

  1. Review profile settings - switch from Strict to Optimized
  2. Limit deep inspection to critical networks only
  3. Exclude high-volume, trusted traffic from inspection
  4. Check for IPS protections with high performance impact
  5. Consider hardware upgrade for heavily loaded gateways

False Positives

Symptoms: Legitimate traffic blocked by Threat Prevention.

Solutions:

  1. Identify the specific protection in logs
  2. Review the protection details and confidence level
  3. Create an exception:
    • Go to Threat Prevention > Exceptions
    • Create an exception for the specific protection and scope
  4. Report false positive to Check Point for signature improvement

Threat Emulation Delays

Symptoms: Users experience delays when downloading files.

Solutions:

  1. Switch from Hold mode to Background mode
  2. Use ThreatCloud emulation instead of local
  3. Configure caching of emulation results
  4. Exclude trusted sources from emulation
  5. Enable Threat Extraction for immediate clean file delivery

Updates Not Installing

Symptoms: Threat Prevention database not updating.

Solutions:

  1. Verify internet connectivity from Management Server
  2. Check proxy settings if applicable
  3. Verify license status includes Threat Prevention updates
  4. Manually trigger update from SmartConsole
  5. Review cpwd_admin logs for update errors

Best Practices Summary

PracticeDescription
Phased RolloutEnable blades incrementally, starting with Detect mode
Monitor PerformanceBaseline before enabling, monitor after each change
Regular UpdatesEnsure automatic updates are configured and working
Exception ManagementDocument all exceptions with business justification
Log AnalysisRegularly review Threat Prevention logs for trends
Profile TuningAdjust profiles based on your environment's needs
ThreatCloudEnsure consistent cloud connectivity for best protection

Next Steps

After enabling basic Threat Prevention:

  1. Tune Profiles - Adjust protection settings based on monitored results
  2. Enable HTTPS Inspection - Extend protection to encrypted traffic
  3. Configure Email Security - Protect against email-borne threats
  4. Integrate with SIEM - Forward logs for centralized analysis
  5. Implement Incident Response - Define procedures for threat alerts

Additional Resources


Need help implementing Check Point Threat Prevention? Inventive HQ provides expert configuration, tuning, and managed threat prevention services. Contact us for a free security assessment.

Frequently Asked Questions

Find answers to common questions

Optimized provides excellent protection for common products and protocols against recent or popular attacks with balanced performance. Strict offers the widest coverage for all products and protocols but may impact network performance. Basic provides reliable protection for non-HTTP protocols with minimal performance impact, ideal for servers.

Need Professional IT & Security Help?

Our team of experts is ready to help protect and optimize your technology infrastructure.