This playbook enables automated or semi-automated blocking of malicious file hashes on a Check Point R80 Firewall based on threat intelligence or suspicious activity. It enhances the organization's threat response capability by preventing known bad files from propagating across the network via firewall-level policy controls.
The workflow empowers SOC analysts to manually validate the threat before committing firewall changes, balancing speed and accuracy. This is particularly useful in malware triage scenarios where hash reputation or sandbox results indicate malicious intent.
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
This playbook enables automated or semi-automated blocking of malicious file hashes on a Check Point R80 Firewall based on threat intelligence or suspicious activity. It enhances the organization's threat response capability by preventing known bad files from propagating across the network via firewall-level policy controls.
The workflow empowers SOC analysts to manually validate the threat before committing firewall changes, balancing speed and accuracy. This is particularly useful in malware triage scenarios where hash reputation or sandbox results indicate malicious intent.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox