<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The requirement to adjust the Information Security Regulator in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/The-requirement-to-adjust-the-Information-Security-Regulator/m-p/276475#M105225</link>
    <description>&lt;P&gt;Colleagues, good afternoon&lt;BR /&gt;We have received a request from the information security regulator&lt;BR /&gt;I'm quoting exactly&lt;BR /&gt;@ Ensure that the sha2 hash function is used for signing certificates. Use the sha1 hash function only if it is necessary to ensure compatibility with outdated software. Do not use md2 and md5 hash functions@@&lt;BR /&gt;Can you tell me how to check these requirements at check point?&lt;/P&gt;</description>
    <pubDate>Tue, 05 May 2026 08:42:07 GMT</pubDate>
    <dc:creator>Aleksey139180</dc:creator>
    <dc:date>2026-05-05T08:42:07Z</dc:date>
    <item>
      <title>The requirement to adjust the Information Security Regulator</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/The-requirement-to-adjust-the-Information-Security-Regulator/m-p/276475#M105225</link>
      <description>&lt;P&gt;Colleagues, good afternoon&lt;BR /&gt;We have received a request from the information security regulator&lt;BR /&gt;I'm quoting exactly&lt;BR /&gt;@ Ensure that the sha2 hash function is used for signing certificates. Use the sha1 hash function only if it is necessary to ensure compatibility with outdated software. Do not use md2 and md5 hash functions@@&lt;BR /&gt;Can you tell me how to check these requirements at check point?&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 08:42:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/The-requirement-to-adjust-the-Information-Security-Regulator/m-p/276475#M105225</guid>
      <dc:creator>Aleksey139180</dc:creator>
      <dc:date>2026-05-05T08:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: The requirement to adjust the Information Security Regulator</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/The-requirement-to-adjust-the-Information-Security-Regulator/m-p/276476#M105226</link>
      <description>&lt;P&gt;I think you should start from this SK:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk103840" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk103840&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In my opinion, but anyone could correct if I'm wrong, you should verify these aspects if used:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;vpn site-to-site with certificate.&lt;/LI&gt;
&lt;LI&gt;platform portal certificate.&lt;/LI&gt;
&lt;LI&gt;HTTPS inspection certificate.&lt;/LI&gt;
&lt;LI&gt;UserCheck certificate.&lt;/LI&gt;
&lt;LI&gt;SAML portal certifica.&lt;/LI&gt;
&lt;LI&gt;and everything else feature that could use certificate on your Check Point infrastructure.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 09:08:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/The-requirement-to-adjust-the-Information-Security-Regulator/m-p/276476#M105226</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-05T09:08:20Z</dc:date>
    </item>
  </channel>
</rss>

