User Manual Part 2

Table Of Contents
SmartDefense Categories
444 Check Point Safe@Office User Guide
Port Scan
An attacker can perform a port scan to determine whether ports are open and vulnerable to
an attack. This is most commonly done by attempting to access a port and waiting for a
response. The response indicates whether or not the port is open.
This category includes the following types of port scans:
Host Port Scan. The attacker scans a specific host's ports to determine which of
the ports are open.
Sweep Scan. The attacker scans various hosts to determine where a specific port
is open.
You can configure how the Safe@Office appliance should react when a port scan is
detected.