This playbook is designed to help Security Operations Center (SOC) teams mitigate threats by automating the blocking of malicious URLs on the Check Point R80 Firewall. It introduces an analyst decision node to maintain human oversight before enforcement, reducing the risk of false positives and network disruption.
The playbook is best suited for scenarios involving phishing, malware distribution, or known C2 (command and control) URLs that require immediate containment.
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
This playbook is designed to help Security Operations Center (SOC) teams mitigate threats by automating the blocking of malicious URLs on the Check Point R80 Firewall. It introduces an analyst decision node to maintain human oversight before enforcement, reducing the risk of false positives and network disruption.
The playbook is best suited for scenarios involving phishing, malware distribution, or known C2 (command and control) URLs that require immediate containment.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox