Skip navigation
All Places > About CheckMates > Blog

About CheckMates

12 posts

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

I am Dorit Dor, VP of Products for Check Point, Ask Me Anything!

We've seen a lot of great questions asked so far of Dr. Dorit Dor, answers for which will be revealed on Monday. Have you got your question in yet?

 

Bulk Add Network Objects

The R80 Management API makes this much easier to do than it was in R77.x with dbedit. 

 

Central Script to run command on multiple gateways

You can leverage the R80 Management API and the cprid_util to remotely execute commands on all your Check Point gateways.

 

Proxy Arp's for subnet not on firewall

How do "arp" for a translated address that's not on your local subnet, particularly when you don't have control over the upstream router? You do something similar to what's described in this thread.

 

Upgrade from R77.20 to R80.10, and failed to verify policy

One thing the Pre-Upgrade Verifier does not do is check the validity of your rules. Which, due to a validation bug in R77.20, caused a problem when upgrading to R80.10.

Sandboxing http/https traffics with third party web proxy in place

In some releases, it is possible to enable ICAP Server support. This will allow you to use a third party web proxy to send traffic to Check Point Threat Emulation.

 

 

Did You Know...

We are starting up a number of local CheckMates chapters?

We've got a list of areas where groups are forming.

Simply find your local area and ask to join.

There isn't a local one to you? Then ask for one to be created!

 

 

Upcoming Events

Our upcoming events in the next few weeks include:

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Each month, we plan to highlight a specific member of the community. For September, that person is Valeri Loukine!

 

The September Check Mates Member of the Month is Valeri Loukine, Sr Security Consulting Architect with Dimension data. Valeri has been one of the strongest contributors to the community providing advice to fellow members and actively engaging in technical conversations to learn more and stay on the cutting edge of (Check Point) security. Many thanks To Valeri for his contributions and participation to help make Check Mates an educational, informative and engaging place to visit!

 

At his day job at Dimension Data Valeri is a “Swiss army knife” for all things security. On any given day he can be found educating potential customers on security, designing customer’s security strategies, or implementing products for customers.

 

Deeply familiar with Check Point products, Valeri has been working with them for more than 15 years. AS part of his on-going commitment to customer success, he is actively engaged in dialog with Check Point via the Check Point user Group (CPUG) and now Check Mates.  While CPUG  has  been  a  great  resource, Check  Mates has  enabled  him to get answers  to  his   technical inquiries  faster through more   direct access   to  Checkpoint  experts.

 

In his spare time Valeri enjoys spending time with his granddaughter in Israel, writing poetry and riding his Harley Davidson through the breath-taking Swiss Alps.

 

On behalf of CheckMates, we thank Valeri for sharing his valuable knowledge with us!

 

Our interview questions and answers are below:

 

Tell us a little about yourself & what you do

These days you can consider me a Swiss Army Knife for Check Point security. I do all of it: technical presales, design, architecture, implementations, migrations, upgrades and support. I also do other security vendors, although on a lesser scale. I train people, write and deliver technical security courses. I consult on security, both on technical and conceptual topics.

 

Tell us a little about your experience with Check Point

I touched Check Point FW first time in 1999. Then it went up hill dramatically after joining Israeli Check Point office in 2000. Since then, I am a Check Point expert. Moving through the ranks, changing positions from VPN QA specialist at the beginning to Check Point Profession Services Consultant at the end of my work at CP Israel would do that to anybody else.

 

After joining Dimension Data in Switzerland in 2008, I commenced participating in CPUG (cpug.org) activities and eventually became CPUG ambassador in Europe. It also happened that I was the first person in Switzerland to achieve CCMA certification. I am most probably the last one to have it still active, at least here

 

You may also mention my CCMA blog: http://checkpoint-master-architect.blogspot.ch/

 

Do you have a unique deployment of a Check Point product?

 

Every single project I do with Check Point is unique. It is really hard to distinguish just one. I have been to places and seen things. Do not even get me started, otherwise I will not stop talking for a week

 

What do you use the CheckMates platform for?

CheckMates is a great tool to share experience, learn things and get in touch with experts. Being a CPUG.org member for over a decade, I have seen multiple Check Point attempts to create something similar. I am happy you have finally found a nice way to do so.

 

What do you like to do for fun? (Hobbies)

Work is fun, most of the time, but I guess the question is not about it. In my spare time, I enjoy spending time with my granddaughter in Israel, writing poetry and riding my Harley. Some hiking in Swiss mountains and touring interesting places are also in the list.

 

 

If you could create any new technology right now, what would it be?

Why should it be technology? One of my distant dreams is to write a book about history of Check Point. Not about technology, although this topic is also fascinating, but about people in and around the company. There are many interesting, dramatic, funny, happy, and sometimes tragic stories there. I have stumbled on some while doing research for a “Short History of Check Point Firewalls” chapter of CPUG papers project: https://www.cpug.org/forums/showthread.php/21868-Paper-1-Brief-History-Of-Check-Point-Firewalls

 

That is a very deep well to drink from, I promise you.

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

Automating IPS

You can leverage the tags feature in IPS profiles in R80+ to make it easier to keep just the right IPS protections active.

 

HowTo - Creating an scpuser account on Gaia Clish

Short and sweet article, which could easily be turned into an Ansible playbook for automation purposes!

 

R77.30 VSX appliance upgrade to R80.10 

If you're planning to upgrade your VSX gateway appliance to R80.10, have a look at this thread. Have you upgraded your VSX to R80.10 yet to leverage 64bit virtual systems, among other things?

 

Activating NGTX (Cloud SandBox) on your gateway 

If you've purchased NGTX with your latest Check Point Appliance package, but haven't activated it yet, here's how to activate it for maximum protection.

 

Check Point Support Resources - Top 10

If you're looking from help from Check Point, here's a list of resources (aside from CheckMates, of course) where you can turn to in order to get help.

 

 

Did You Know...

 

We have a lot of spaces on CheckMates where you can ask for help?

The spaces are organized by topics and product lines.

This is done to make it easier to find relevant content and allows the relevant people inside Check Point to monitor and respond accordingly.

Refer to the following document for a list of products and what spaces they map to: All Products and Where To Post About Them

 

 

Upcoming Events

Our upcoming events in the next few weeks include:

 

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

Bandwidth Monitoring of Specific Interface? 

A new user moving from a different vendor's solution asks about how to monitor the bandwidth used by a specific interface. This thread explains how to do that using SmartView Monitor.

How to revert a Policy or discard changes? 

The way you revert a policy to a previous version in R80+ has changed from R77.30 and earlier. This thread details those changes.

 

Log cleaning rule

Nicolas Boisse created a script to query all your gateways, determine their broadcast address, and create a rule that will drop broadcasts from those networks.

 

Check Point configuration mistakes - Top 10

Danny Jung shares his Top 10 configuration mistakes he sees people make. The good news is that in R80.10, we've made it easier to do the right thing. 

 

Updated Scripts from Check Point 

The Check Point R&D API Team updated several of the scripts previously published to Developers (Code Hub) and published the source to Github:

 

Did You Know...

There is a mobile app available for CheckMates?

While the CheckMates Community site is fairly mobile-friendly, some prefer a native mobile app that can provide push notifications on responses to posts.

You can download the Jive Daily app for iOS or Android as follows:

When prompted, enter community.checkpoint.com as the community and sign in with your User Center credentials.

 

Upcoming Events

Our upcoming events in September include:

  • Cloud Security Best Practices with Amit Schnitzer on September 6th
  • Ask Me Anything with Dorit Dor and her team on September 18th

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

Check Point 1400 Appliance - FAQ

This is a great resource telling you everything you ever wanted to know about the 1400 series of appliances. One of our partners Danny Jung put this together and is continually updating it!

 

Compliance Blade how-to videos

Tomer Sole produced some videos on how to best leverage the Compliances Blade in R80.10. 

 

How to block OpenVPN

It's pretty straightforward if you want to block all use of it, a little bit less so when there is legitimate use you also need to allow. Still, something Application Control has no issue with.

 

Infinity R80.10 "Cool Feature of the Day" - Prevent installing the wrong policy 

One way to achieve this is to Set Installation Target for Policies, which has been an option for quite some time. Another way, introduced as a "beta" feature in R80.10, is described in this article.

 

Unify Policy Migration from R77.30

Some legacy features were not brought forward to R80.x as they have been replaced with newer features. In this thread, legacy user groups need to be replaced with Access Roles (an Identity Awareness feature).

 

Did You Know...

You can respond to the emails you get from CheckMates to update a thread?

I know this is a repeat of last week's tip, but I wanted to repeat it to reiterate the warning that goes with this: make sure if you use this feature, your email response doesn't include any signature information or it will be posted along with your messages! I've edited a few messages to remove this information.

 

Unless you've disabled email notifications on your account, which you can do here, you should get an email for new responses on a given thread or content you have chosen to follow, which you can do from the Actions menu:

 

 

When you get the email, it will look something like this:

 

Simply respond to the email like you would any other:

 

 

Your email will appear in the relevant thread as a reply to the comment you are responding to:

 

 

A word of warning: Make sure to disable your email signature on these emails as they will be included in your post to CheckMates. You may not want that. 

 

 

Upcoming Events

Our upcoming events in September include:

  • Cloud Security Best Practices with Amit Schnitzer on September 6th
  • Ask Me Anything with Dorit Dor and her team on September 18th

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

Leveraging the R80.10 API to Automate and Streamline Security Operations

Our latest TechTalk was held this week on using the R80.10 API to automate and orchestrate your security. Ryan Darst gave a great demo and there were a lot of questions. Watch the video and access the materials!

 

How-to use Postman with R80 Security Management API

One of the tools used to demonstrate the R80 API was a tool called Postman. We had a "collection" for the R80 API and recently added one for R80.10. And of course, there were some questions!

 

Sending Check Point security logs to 3rd party devices via syslog

In case you haven't seen yet, CPLogToSyslog is now available for R80.10 as it was published for other releases a few weeks back! Improved syslog support (beyond what CPLogToSyslog provides) is planned in the coming months. Watch the Logging, Monitoring, & Event Analysis for more details!

 

Unify Policy Migration from R77.30

If you want to leverage the unified policy feature in R80.10, you'll need to stop using some legacy features, which do not support the unified policy.

 

Policy Migration From Standalone to Distributed

There are a couple of options from converting your standalone gateway (with integrated management) to a distributed configuration. 

 

Did You Know...

You can respond to the emails you get from CheckMates to update a thread?

Unless you've disabled email notifications on your account, which you can do here, you should get an email for new responses on a given thread or content you have chosen to follow, which you can do from the Actions menu:

 

 

When you get the email, it will look something like this:

 

Simply respond to the email like you would any other:

 

 

Your email will appear in the relevant thread as a reply to the comment you are responding to:

 

 

A word of warning: Make sure to disable your email signature on these emails as they will be included in your post to CheckMates. You may not want that.

 

 

Upcoming Events

Our upcoming events in September include:

  • Cloud Security Best Practices with Amit Schnitzer on September 6th
  • Ask Me Anything with Dorit Dor and her team on September 18th

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates 

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

CLI API Example for exporting, importing, and deleting different objects using CSV files (v 00.25.01 and later)

Eric Beasley has been updating his scripts for importing and exporting different types of content from the R80 API. This version can now handle more than 500 objects at a time, which is a limit imposed by the API. There's also a link to his Github repository where you can contribute your own changes!

 

R80 SmartReporter : how to do a report "rule base analysis"?

SmartReporter was retired in the R80 release. One feature it had was the ability to run a report to see when the last time a rule was used. This thread explains how to recreate that functionality in R80.10 with SmartEvent.

 

https Inspection

A good discussion around the challenges with implementing HTTPS Inspection. Have you implemented this? What challenges did you run into and how did you address them?

 

Navigating Between Rules | R80.10 Rulebase

Something we're trying to produce more of for CheckMates is how-to videos. This one shows you some tricks and tips for navigating the rulebase in R80.10, which are particularly handy if you have a rulebase of significant size.

 

Application URL blade - with SmartLog R80.10

This is a great tip from Aaron Pritchard on how to make it easier for administrators to deal with blocked application/URL reports from end users!

 

My Top 3 Check Point CLI commands

This thread has garnered a lot of activity on CheckMates. In addition to more commands, we're now getting to stories of days gone by. Keep following this thread!

 

 

Did You Know...

You can send a Private Message to someone?

For anti-spam purposes, the person you wish to send a Private Message to must "follow" you.

You can choose to follow someone by simply hovering over their name and clicking the Follow button that appears below their avatar.

If they follow you, you will also see the "Message" button.

 

 

 

Upcoming CheckMates Live Events

The next virtual event will be How to use R80.10 API for Automation and Streamlined Security with Ryan Darst on August 15th!

I am also making the rounds to local user group meetings during the month of September.

I'll have some of these to give away: 

 

 

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Welcome to "This Week in Checkmates," your weekly highlight reel for all things CheckMates!

Past and future posts will be available here: About CheckMates 

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

Share your Check Point Memorabilia for a chance to have it autographed by Gil Shwed!

I know some of you have some old Check Point memorabilia in your closets. Clean it out, snap a picture of it, post it on this thread! Who knows, you might win an opportunity to have Gil Shwed autograph it!

 

R77.30 to R80.10 upgrade issue 

While many upgrades go successfully automatically, some do require help from the TAC. Some potential things to look for when it fails are in this thread. Also, you may want to make sure your CPUSE version is up to date, as suggested in this thread: Upgrade from 77.30 to 80.10 problem 

 

VTI creation in console 

While the API and CLI support has improved quite a bit in R80.10, there are still some things that require SmartConsole. This is one of them...

 

Can we get the routes from R80?

While there is not a specific API for this, there is a way to get the information. Check the thread for details!

 

mgmt_cli without authentication?

There is an equivalent to dbedit -local in R80+, which can be useful in scripts that run on the management and perform automated functions.

 

Did You Know...

What CheckMates Live is? There are two elements to it:

 

 

Feedback

We would be delighted to hear your feedback! Here are a few ways you can share it with us:

Each month, we plan to highlight a specific member of the community. For August, that person is Tim Hall!

 

Tim Hall is the founder and owner of Shadow Peak Inc., an independently run enterprise started in 2004 that specializes in Check Point training and consulting services. His company has assisted clients from all over the world, including one with firewalls located in Antarctica.

 

Tim has been working with Check Point products since 1997, and as part of his work authored "Max Power: Check Point Firewall Performance Optimization", which centers on the performance intricacies of Check Point products. His newest publication, a second edition focusing on the R80 and R80.10 updates, is currently under development.

 

Although Tim would consider himself an expert in R80.10, he noted, “CheckMates has helped me with learning about the new R80 release, learning about little nooks and crannies in the GUI, and the underlying implementation.”

  

Apart from his love for technology, he also has a passion for collecting. Tim has a basement full of antique pinball machines from the 1970’s to the 1990’s, as well as a collection of arcade video games including Galaga, Tempest, and Pac-Man.

 

In Tim’s words:

"CheckMates is the continuation of spreading knowledge and assisting administrators with various problems.” 

On behalf of CheckMates, we thank Tim for sharing his valuable knowledge with us!

 

Our interview questions and answers are below:

 

Tell us a little about yourself & what you do

I've been working with Check Point products since 1997. I have had my own independently run business since 2004. My business Shadow Peak Incorporated is a one-man corporation that specializes in Check Point training and consulting services.

 

Tell us a little about your experience with Check Point

In 1997, with a company called Evolving Systems, we needed a firewall that could do a VPN, and there was this relatively new kid on the block called Check Point. It was a logical pairing of product to experience based on the Solaris systems experience I had. It's been 20 years this year that I've used a variety of Check Point products.

 

Do you have a unique deployment of a Check Point product?

There's a large defense contractor with firewalls in Antarctica that I did a fair amount of work for that had a pretty large Check Point deployment. I was doing some work with a firewall and I’m like, “Why is this one so slow?” It was because we’re going over a satellite to reach that area and we could only do it at certain times of day.

 

What do you use the CheckMates platform for?

With CheckMates for me, the best thing was learning about the new R80 release, learning about little nooks and crannies in the GUI, and the underlying implementation. Definitely learning about the new R80 and of course R80.10 releases is mainly what I use it for.

 

What do you like to do for fun? (Hobbies)

I collect antique pinball machines and video games. In my basement I have pinball machines ranging from the 1970s to the 1990s. I also have a Galaga, Tempest, Pac-Man – actual full size arcade cabinets. I'm also always reading about different technology or articles on CPUG. I strive to be a pure force of technical knowledge.

 

If you could create any new technology right now, what would it be?

If I could create any new technology, I'd say it would be for an individual's personal data that is bought, bartered, brokered, traded, etc., to notify them every time that data is used or accessed. It would be very scary and I think people would realize how much their personal data is just kind of floating around and being leaked and sold.

 

Here's this weeks installment of "This Week in CheckMates."

Past and future posts will be available here: About CheckMates 

If you can't wait for the weekly update, follow our Twitter account where threads are highlighted regularly: @CPCheckMates!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

My Top 3 Check Point CLI commands

While this was featured last week, it's worth mentioning again as this thread has quickly become one of the most active posts we've had on CheckMates! New commands being added all the time. Have you contributed yours yet?

 

Check Point Gateway Updates and SHA-256

This issue came up in two different threads:

Check Point switched to using SHA-256 certificates on the systems which gateways fetch various updates from (e.g. for App Control and Anti-Virus signatures). This impacts all Check Point products. To ensure your gateway can receive updates, check your code version jumbo hotfix level against the following SK: Check Point update and online services migration to SHA-256 based certificates 

 

How-to use Postman with R80 Security Management API  

Postman is a free Google Chrome extension that can be used for testing and experimenting with web-services, such as the Security Management API that was released with R80. A new Postman Collection was added to this thread that will allow you to use Postman with the R80.10 API.

 

Continuing policy work-in-progress with R80.10 Session Take Over

Here's a brief video showing a cool feature in R80.10: the ability to take over a session another administrator has started but didn't commit! We plan to produce additional videos in the near future.

 

This Week in Threats: Week of July 24th 2017

Our Threat Intelligence team has been producing a weekly report that discusses the latest threats for some time now. We are now making these reports available to CheckMates members!

 

App Control issue with R80 MGMT, 1400 Appliance

If you're managing any R77.x gateway (including SMB appliances) with R80.10 and you want to use Application Control/URL Filtering, make sure you are creating and using a separate policy layer for this feature. This is because R77.x gateways do not support unified policy the way R80.10+ gateways do. 

 

Did You Know...

The forums have RSS feeds?

You can either subscribe to individual spaces or the whole site!

If you go to the relevant space and navigate to the Content section:

 

 

You will find an RSS link at the bottom left:

 

This link can be imported into your RSS reader of choice. 

You'll also notice in the above screenshot that you can get a list of content for the entire site using the link https://community.checkpoint.com/content

 

Two tips for the price of one

 

Feedback

You are of course welcome to respond to this post if you have questions! If you want to send something privately, you can send an email to checkmates@checkpoint.com or send a Tweet to @CPCheckMates and we'll respond promptly.

Here's this weeks installment of "This Week in CheckMates."

Past and future posts will be available here: About CheckMates 

Also, if you're not sure what CheckMates is, check out this short video!

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

 

SNORT Rules and CheckPoint R77.30 IPS

The question was about having a particular signature trigger a block of the specific IP address for all traffic. This can be done, but it does require building a script that parses the log entry and executes fw samp to block the connection.

 

Installing take 10 of R80.10 blew away the gateway part of a single gateway setup. Is that a known problem?

It appears to be a known issue that can happen under a rare combination of circumstances. Read the thread for a workaround to the issue. A fix for the issue will be coming in a future R80.10 jumbo hotfix.

 

Issue when migrating R77.30 to R80.10 Management Server

Look for words like "error","fail", and "unable" in the following file: $FWDIR/log/cpm_for_cpdb-YYYY-MM-DD-HH-MM-SS.ELG. You may need to engage with the TAC depending on what this turns up for you.

 

My Top 3 Check Point CLI commands

Chances are, if you've been using Check Point products for a while, you've had to do something on a command line. We've shared some of our favorite (and even obscure) commands with you here. This has quickly become one of our most active threads, chime in with your favorites!

 

CLI API Example for exporting, importing, and deleting different objects using CSV files (v 00.25.01 and later)

This is a great set of scripts for migrating objects in and out of a Check Point R80+ management station using CSV files created by one of our SEs, Eric Beasley. Have you used them yet?

 

Did You Know...

 

You can control how often you receive email from the community?

We created a short video to explain how, which can also be viewed side-by-side with the captions here: Set Email Notification Prefs in CheckMates | fleeq.io 

 

 

 

Feedback

You are of course welcome to respond to this post if you have questions! If you want to send something privately, you can send an email to checkmates@checkpoint.com and we'll respond promptly.

This is the first of a regular series of posts highlighting activity in the CheckMates community during the past week.

I will also provide a tip that will help you make the best use of CheckMates!

Future posts (planned to be posted on Fridays) will be available here: https://community.checkpoint.com/blog/about-checkmates 

 

Community Highlights

Here are some highlights from the week's activity on CheckMates:

NotPetya: Under the Microscope Presentation and Recording 

This week, we did our first in a series of "CheckMates Live" webcast. Shortly after the webcast, we made the recording and slides available. However, unlike most content on CheckMates, this content requires you to be signed in to view it.

 

What Version of Check Point Management are You Using? 

This is a new poll I created to see what versions of Check Point Management people are using and why. Everyone has their reasons for upgrading (or not). Vote and contribute to the discussion!

 

CPLogToSyslog Utility Now GA 

This tool, which had been available privately for a number of months, was recently released publicly. There was a question about whether or not BSD logging format was supported. Not by CPLogToSyslog, but via a process described by the following SecureKnowledge article: How to Configure R77.30 Security Gateway on Gaia OS to send Firewall logs to an external Syslog server

 

Documents for Centrally Managed Remote Access VPN with Embedded Gaia

There is no specific documentation on this topic because Embedded Gaia platforms are no different than regular Security Gateways when it comes to setting up remote access VPN.

 

Multiple ISP Redundancy: Will it be Supported in R80?  

This was an older thread that was brought to the surface recently when a customer wondered how to use the ISP Redundancy feature with more than 2 ISPs. The answer in this particular case will likely involve dynamic routing.

 

Did You Know...

You can use the Jive Daily app to access CheckMates from your mobile device?

While the CheckMates Community site is fairly mobile-friendly, some prefer a native mobile app.

You can download the Jive Daily app for iOS or Android as follows:

When prompted, enter community.checkpoint.com as the community and sign in with your User Center credentials.

 

Feedback

You are of course welcome to respond to this post if you have questions! If you want to send something privately, you can send an email to checkmates@checkpoint.com and we'll respond promptly.