Skip navigation
All Places >

Management (R80.10)

Log in to follow, share, and participate in this community.

Recent Activity

Bob Bent
In R77 access control is applied in an ordered fashion, for instance firewall rules are checked before application control rules. There was duplication in the firewall and application object definitions and in the policies. In R80.10 this is simplified by defining which security features you want the policy layer to inspect in the unified policy.… (Show more)
in Management (R80.10)
Kosin Usuwanthim
Hi  Can checkpoint R80.10 export schedule report by upload to ftp server ? Please advice.
in Management (R80.10)
Dameon Welch Abernathy
  In this session, we provided an overview of how the Check Point Compliance Blade can verify your security management configuration is compliant to your organizations's requirements. Specifically, we will cover the following:   Get alerted when a configuration violates security best practices Fix the misconfiguration, modify the best practice, or… (Show more)
in Management (R80.10)
Dameon Welch Abernathy
I've noted this a few times in various threads, but we now have an official SK documenting this fact: Discontinuation of Security Management Support on Windows  The last versions of Security Management supported on Windows are: Security Management R77.30 Endpoint Management R77.30.01 (E80.62) Large Scale R77.20 EP6.0 These versions will… (Show more)
in Management (R80.10)
Hugo van der Kooij
I was trying to see if I can use Geo Policies more selectively in R80.10   For example: I want only a few countries to start SSH to a server. I want to block certain countries from starting a SMTP connection.   Has anyone figures out a way on how to do that?
in Management (R80.10)
Yair Herling
Hi all,   I would like to share with you a first and exclusive glimpse of our new Check Point Infinity - "Connecting the dots" Technical Marketing movie that will be published shortly. The purpose of this video is to share a technical demonstration of what the cyber-security architecture of the future is all about.   Enjoy (and feel free to…
Video preview image▶︎
in Management (R80.10)
Biju Nair
Hi,   I wish to implement a user based access rules in firewall. I am using 13k series firewall as a data center firewall. Access from user workstation to server should be based on "user logon" information. (Source as a AD user and dst would be a server IP)   Based on my knowledge, I assume that this is simple by using LDAP integration.… (Show more)
in Management (R80.10)
Vladimir Yakovlev
Somewhat trivial question, but I am interested in the impact the group objects have on policy. If, for example, we have a single source and a destination comprised of 250 objects, will this result in firewall "creating" 250 virtual rules to process the parent rule? If the group members are IP addresses, how are they sorted for processing? If… (Show more)
in Management (R80.10)
Marco Valenti
Hey all   I had a question that bug me this day , was it mandatory or not to set up internal dns instead of the isp one when you have identity awareness enabled on your gateway?   thanks in advance
in Management (R80.10)
Load more items