Advisories — Step-by-step instructions on how to activate and configure protections against emerging threats and vulnerabilities, usually before exploits are created by hackers
Security Best Practices — The latest security recommendations from Check Point
Microsoft Security Page — Extensive coverage of Microsoft Security Bulletins and methods to protect your Microsoft environment
Every protection is also documented in great detail to give insight to the exploit, how it works, and it’s potential impact.. Great care is taken in ensuring protection documentation is informative and useful.