Which Threat Tool within SmartConsole provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
Which Threat Tool within SmartConsole provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed?
The Threat Tool within SmartConsole that provides a list of trusted files to the administrator so they can specify to the Threat Prevention blade that these files do not need to be scanned or analyzed is 'Whitelist Files'. This tool is used to manage files that are known to be safe, thereby reducing the need for unnecessary scanning and conserving system resources by excluding these files from Threat Prevention scans.
B is correct, Threat Wiki is an online malware database that can suggest us what we should block on other hand the whitelist is those files we trust and don not want the threat prevention will check
B obvious
B is ok https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_ThreatPrevention_AdminGuide/Topics-TPG/Using-the-Whitelist.htm#:~:text=Whitelist%20is%20a%20list%20of,resource%20utilization%20on%20the%20gateway.&text=Select%20Threat%20Prevention%20%3E%20Advanced%20%3E%20Whitelist,The%20Whitelist%20Files%20page%20opens.
Using the Whitelist Whitelist is a list of files that are trusted. Check PointThreat Prevention engine does not inspect trusted files for malware, viruses, and bots, which helps decrease resource utilization on the gateway. https://dl3.checkpoint.com/paid/0a/0a9a4722c3031fb380e5a9e4e64d1614/CP_R80.40_ThreatPrevention_AdminGuide.pdf?HashKey=1653488289_3c0008b9edc193d6e4fd2033015d34b6&xtn=.pdf
B is correct. ThreatWiki is a Database... is not a list files https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/SmartConsole-Toolbars-Access-and-Threat-Tools.htm
Whitelist is a list of files that are trusted. Check Point Threat Prevention engine does not inspect trusted files for malware, viruses, and bots, which helps decrease resource utilization on the gateway. https://sc1.checkpoint.com/documents/R80/CP_R80_SmartDashboard_OLH/html_frameset.htm?topic=documents/R80/CP_R80_SmartDashboard_OLH/dk6smDgTdUfgmc_QkMcOVg2
It's B "so they can specify to the Threat Prevention blade"
nope, A is correct. Threat Wiki - A tool to see the entire Malware database. Open it from the Threat Wiki pane in the Threat Prevention tab or from the Check Point website. https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/82209.htm
I'm sorry, correct answer is B. https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_ThreatPrevention_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_ThreatPrevention_AdminGuide/131103