User Manual Part 2

Table Of Contents
SmartDefense Categories
454 Check Point Safe@Office User Guide
Table 93: File Print and Sharing Fields
In this field… Do this…
Action Specify what action to take when a CIFS worm attack is detected, by
selecting one of the following:
Block. Block the attack.
None. No action. This is the default.
Track Specify whether to log CIFS worm attacks, by selecting one of the
following:
Log. Log the attack.
None. Do not log the attack. This is the default.
CIFS worm patterns
list
Select the worm patterns to detect.
Patterns are matched against file names (including file paths but
excluding the disk share name) that the client is trying to read or
write from the server.