User's Manual

Contents
iv Check Point Safe@Office User Guide
Chapter 6: Viewing Reports ........................................................................101
Viewing the Event Log...............................................................................101
Viewing Computers....................................................................................104
Viewing Connections..................................................................................106
Chapter 7: Setting Your Security Policy .................................................... 107
Setting the Firewall Security Level.............................................................107
Configuring Servers.................................................................................... 110
Creating Rules ............................................................................................112
Adding and Editing Rules....................................................................... 113
Deleting Rules ........................................................................................ 121
Defining an Exposed Host .......................................................................... 121
Chapter 8: Using Subscription Services .....................................................123
Connecting to a Service Center...................................................................123
Viewing Services Information .................................................................... 130
Refreshing Your Service Center Connection.............................................. 131
Configuring Your Account .........................................................................131
Disconnecting from Your Service Center................................................... 132
Web Filtering..............................................................................................133
Enabling/Disabling Web Filtering .......................................................... 133
Selecting Categories for Blocking .......................................................... 134
Temporarily Disabling Web Filtering..................................................... 134
Virus Scanning............................................................................................136
Enabling/Disabling Email Antivirus....................................................... 136
Selecting Protocols for Scanning............................................................ 137
Temporarily Disabling Email Antivirus ................................................. 137
Automatic and Manual Updates .................................................................139