Skip navigation


Recent Posts
Daniel Taney
I was reading through this thread discussing pros/cons of using "ALL_DCE_RPC" in a Firewall Policy: What is Check Point's solution for RPC traffic on Internal firewall?    I'll admit, I've been using Check Point for a while and I was wholly unfamiliar with ALL_DCE_RPC and what it did. Would someone be able to offer a quick

Ivan Lim
Original credit goes to this post (please go over there to read up on it first): Log rate calculator for MDS / MLM   Basically took the script & modified it for single domain. In addition to showing log rates, also added in extra information: - number of logs generated during monitoring period - increase in log file size during
Top & Trending
Tomer Sole
Hi,   Check Point Compliance Blade provides built-in and user-defined security best practices to ensure that an administrator's work does not cause a misconfiguration. Some of those best practices are linked to regulations and requirements. With R80.10, you can browse versions of HIPAA, NIST, PCI and more. In order