Recent Posts

Dameon Welch Abernathy
More than 4,000 corporates were attacked, with at least 14 known successful infections, Chicago's entire voter database was left in the cloud and exposed to everyone for months, yet more malicious apps found in Google Play, and WannaCry appears to have impacted multiple service centers of LG Electronics. Details on these items and more can be… (Show more)
in Threat Prevention
Justin Hickey
I'm trying to automate the regular export of snapshots. I always run into an issue with the 'path'. I don't understand, if this is an export, how else would the path be formatted ?   set snapshot export CPMGT_Snapshot_01 path ftp://admin:thepassword@10.1.1.11/ name CPMGT_Snapshot_01 NMSNAP0042  Bad Path input Thanks, Your CheckMate, Justin
in Management (R80.10)
Raj Khatri
Has anyone run into log indexes not deleting on Log Server?  On the log server under Logs | Storage | Index Files, the "delete index files older than x" days is checked, however they are not clearing.   Logs indexes are stored here: /var/log/opt/CPrt-R80/log_indexes   We have set to 30 days but there are 90 days of log indexes which caused… (Show more)
Sagar Manandhar
Hi, i am using 5600 appliance and there i have written different application and url filtering policy in which pornography and media stream(category)  is at top and is block. But all the client are being able to access the porn site and media. when i see the log of application and url it show allow but when i click to "Go to policy" tab there… (Show more)
in Policy Management
Eric Speake
We have R80.10 and I am looking to block the ability to view cached google pages. Any ideas or thoughts?   Thanks, Eric
in General Product Topics
Danny Jung
Author: Danny Jung Want more Check Point info? Read our tech blog! Q: What's the official product site ? A: Check Point 1400 Appliance | Datasheet | Support Center Q: What's the 1400 Appliance's SecureKnowledge article ? A: sk110985 | Release Notes | Known Limitations Q: Where can I find Getting Started Guides ? A: Centrally…
in SMB and SMP
Danny Jung
PrefaceSecuring virtual private networks (VPNs) in enterprise Site-to-Site environments is an important task for keeping the trusted network and data protected. Also it's critical to avoid any loss of data sovereignty.   When it comes to VPN security many security experts first think of encryption algorithms, perfect forward secrecy (PFS),…
ATC Email Alias
Check Point Education Services has released the new R80 Security Administrator (CCSA) course to the Authorized Training Centers Partners. ATC Partners are your best source for training and certification exam preparation. Locate an ATC in your area.   The certification exam for R80 CCSA (156-215.80) is now available at PearsonVUE. Exam cost is… (Show more)
in General Product Topics
Ronen Zel
If you’re a security professional, systems administrator, or a network engineer, the Security Expert Technical Newsletter brings you essential, useful information you need, direct to your inbox. Our newsletter includes the latest information, tips, news, and critical information you need. To learn how to register, to view previous Newsletter… (Show more)
in General Product Topics
Andreas Falk
Anyone having having problem with threatwiki today?   Gateway Timeout The proxy server did not receive a timely response from the upstream server. Reference #1.xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx   Or is it only over here? -- Regards Falk
in General Product Topics
Moti Sagey
Just had a fun geeky conversation with Dameon Welch Abernathy (AKA Phoneboy) Jony Fischbein , Jeff Schwartz and Michael Poublon (over 100 accumulated years of experience in Check Point products) , on what are our favorite & most useful commands in a Check Point environment. Below are my 3 , plz add yours in the comments (we will do a poll for the… (Show more)
in General Product Topics
Sagar Manandhar
hi, One of our customer is using standalone firewall (5600 appliance) and has the license for the same. But due to maximum resource utilization of the 5600 appliance they are requesting to go for distributed environment. So, they got the license for the standalone, is it possible that they can go for distributed environment with same license.… (Show more)
Load more items