Skip navigation
All Places > Management (R80.10)

Policy Management

Log in to follow, share, and participate in this community.

Recent Activity

Daniel Taney
I was reading through this thread discussing pros/cons of using "ALL_DCE_RPC" in a Firewall Policy: What is Check Point's solution for RPC traffic on Internal firewall?    I'll admit, I've been using Check Point for a while and I was wholly unfamiliar with ALL_DCE_RPC and what it did. Would someone be able to offer a quick crash course… (Show more)
in Policy Management
Tomer Sole
Hi,   Check Point Compliance Blade provides built-in and user-defined security best practices to ensure that an administrator's work does not cause a misconfiguration. Some of those best practices are linked to regulations and requirements. With R80.10, you can browse versions of HIPAA, NIST, PCI and more. In order to include GDPR best… (Show more)
in Policy Management
Don Paterson
Hello,   I am hoping someone can give me more detailed or background information (or a link to an SK) to learn more about the steps below. Especially step 2.   Verification & Compilation The Verification & Compilation stage of policy installation occurs on the management side. It involves the following steps:   1.Initiation — Policy installation… (Show more)
in Policy Management
Lloyd Barnett
Is the plan or are there plans to create the console suite for R80 (and iterations going forward) to be built in 64-bit to leverage higher memory addresses on laptops/desktops with lots of memory and want to have tons of windows/console applications open  -and will this be NGSE or both?   Any reasons why there shouldn't a reason to be moving to… (Show more)
in Policy Management
Tomer Sole
The "hits" and "comments" columns used to be visible by default. After installing SmartConsole they disappeared. How do I bring them back?
in Policy Management
Raj Khatri
In the search bar, you can search for an IP Address, which returns the IP of the host object.  However, you cannot search for a NAT IP Address.  You could do this previously, but not in R80.   Any ideas if this is fixed in R80 GA or plans to get this working in a future hotfix?
in Policy Management
Sabi Halevi
When creating new user in R80.10, the column "group" does not appear:   it's only going to the group itself, to see its members, and add members.   In R77.30, there was an option to see+add a user to a group from the user itself:     Any idea?   Thanks
in Policy Management
Tomer Sole
With R80.10, the new default profile "Optimized" sets all newly downloaded IPS protections to be in state "detect (staging)" or "inactive".   1. We start with the general page. It has settings in which a protection should be in detect, prevent, or inactive.     2. Then, in the "updates" page, we see that newly downloaded protections are… (Show more)
in Policy Management
Jon Dyke
I am interested in how people use IPS in R80.10.  In R77.30 we would go through the flagged list then set the relevant protections to detect for 7 days – we would then clear down the flags for the ones we do not set.  We would then review the logs to make sure there is no impact to legitimate site traffic (we have a customer facing SAAS platform)… (Show more)
in Policy Management
Sagar Manandhar
I got the queries, if it is possible to implement a policy which block the client from downloading the executable(exe) files in  checkpoint. Our client were using fortinet 200D where we found such policy. So, we need to make that same policy to checkpoint. Regards, Sagar Manandhar
in Policy Management
Load more items