Exlclusions

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
35 minutes
Difficulty
Beginner
CEU/CPE
1
Video Transcription
00:00
>> [MUSIC]
00:00
In this module,
00:00
we will cover Exclusions.
00:00
Let's say you need to organize
00:00
your closet and you
00:00
need to get rid of a lot of old stuff.
00:00
But when you start throwing items out,
00:00
you see an old shirt you once
00:00
loved and decide to save it.
00:00
What defines this shirt?
00:00
The brand, the color,
00:00
the fact that it is water resistant?
00:00
In this case, it was love.
00:00
Going back to endpoint.
00:00
As we offer protections on so many factors,
00:00
we will block and remove malicious
00:00
>> and suspicious files.
00:00
>> But what if you need to make an exception?
00:00
The exception type will change based on
00:00
the capability it's part of.
00:00
For example, if you use URL filtering,
00:00
the exclusion will be a URL.
00:00
If the capability is anti-bot,
00:00
the exclusion would be a process,
00:00
a URL, an IP range,
00:00
the main name or a protection name.
00:00
If we're talking about anti-malware,
00:00
the exclusion will be a path which we won't scan.
00:00
Microsoft offers a great webpage
00:00
with their applications and
00:00
the exclusions that needs to be configured
00:00
in order for the applications to run smoothly.
00:00
More information and examples can be found in
00:00
the Check Point's support center under sk128472.
00:00
From the Policy tab,
00:00
I will go to the Threat Emulation Capability
00:00
and the Exclusion Center.
00:00
I'm going to go to Anti-bot exclusions, select Add.
00:00
I can select for a process to exclude a URL,
00:00
a domain from where we will exclude,
00:00
a protection name, IP range.
00:00
It depends on the capability.
00:00
Then you'll just have to go and
00:00
configure the right exclusions.
00:00
Thank you for watching. [MUSIC]
Up Next