<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: White Papers Publishing Project in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53256#M10609</link>
    <description>We have a bunch of these, more will be coming soon.</description>
    <pubDate>Sun, 12 May 2019 23:39:05 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-05-12T23:39:05Z</dc:date>
    <item>
      <title>White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603</link>
      <description>&lt;P&gt;Hi CheckMaters,&lt;/P&gt;
&lt;P&gt;We have a number of whitepapers available&amp;nbsp;created by various Check Point Security Engineers around the globe and&amp;nbsp;cover various products, implementation scenarios, features and configuration details.&lt;/P&gt;
&lt;P&gt;We have also included some whitepapers produced by&amp;nbsp;&lt;A href="https://www.cybertalk.org" target="_self"&gt;our friends at CyberTalk.org&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Here is the list:&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;H3&gt;Name&lt;/H3&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;H3&gt;Link&lt;/H3&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;A deeper dive into FQDN Objects&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Domain-Objects-FQDN-An-Unofficial-ATRG/td-p/40789" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/Domain-Objects-FQDN-An-Unofficial-ATRG/td-p/40789&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;CDT and Blink&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Central-Deployment-Tool-CDT-and-Blink/td-p/52503" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Central-Deployment-Tool-CDT-and-Blink/td-p/52503&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Guide to configure logging to SolarWinds LEM SIEM&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Integrating-Check-Point-SMS-with-SolarWinds-LEM/td-p/52505" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Integrating-Check-Point-SMS-with-SolarWinds-LEM/td-p/52505&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Configuring R80.10 GW to send logs to Log Analytics&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Configuring-R80-10-GW-to-send-logs-to-Log-Analytics/m-p/52506#M3244" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Configuring-R80-10-GW-to-send-logs-to-Log-Analytics/m-p/52506#M3244&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Restoring a large MDS environment in VMware from mds backup&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Multi-Domain-Management/White-Paper-Restoring-a-large-enterprise-MDM-environment-in/td-p/52507" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Multi-Domain-Management/White-Paper-Restoring-a-large-enterprise-MDM-environment-in/td-p/52507&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Recovering a file from Gaia Snapshot&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Extracting-a-file-from-a-GAIA-Snapshot/td-p/52520" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Extracting-a-file-from-a-GAIA-Snapshot/td-p/52520&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Integrating Custom IOC Feeds&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/White-Paper-Integrating-Custom-IOC-Feeds/td-p/52522" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Developers-API-CLI/White-Paper-Integrating-Custom-IOC-Feeds/td-p/52522&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;RulebaseExporter/RulebaseImporter&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/RulebaseExporter-RulebaseImporter/td-p/39126" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Developers-API-CLI/RulebaseExporter-RulebaseImporter/td-p/39126&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Cloud Guard: Automated firewall Cluster Deployment with auto-scaling option&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/Cloud-Guard-Automated-firewall-Cluster-Deployment-with-auto/td-p/39480" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Developers-API-CLI/Cloud-Guard-Automated-firewall-Cluster-Deployment-with-auto/td-p/39480&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Log cleaning rule&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Developers-API-CLI/Log-cleaning-rule/td-p/38385" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Developers-API-CLI/Log-cleaning-rule/td-p/38385&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Deploying Auto Scaling CloudGuard gateways in Azure using VM Scale Sets&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/Deploying-Auto-Scaling-CloudGuard-gateways-in-Azure-using-VM/td-p/39967" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/Deploying-Auto-Scaling-CloudGuard-gateways-in-Azure-using-VM/td-p/39967&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Tufin integration with Check Point R80&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Tufin-integration-with-Check-Point-R80-docx/td-p/40351" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/Tufin-integration-with-Check-Point-R80-docx/td-p/40351&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 69px;"&gt;
&lt;TD style="width: 30%; height: 69px;"&gt;Integration of Gemalto’s MobilePass+ Secure MFA and Managed Identities with the Check Point Firewall Mobile Access Blade as an IT Automator&lt;/TD&gt;
&lt;TD style="width: 70%; height: 69px;"&gt;&lt;A href="https://community.checkpoint.com/t5/SandBlast-Mobile/Integration-of-Gemalto-s-MobilePass-Secure-MFA-and-Managed/td-p/40370" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SandBlast-Mobile/Integration-of-Gemalto-s-MobilePass-Secure-MFA-and-Managed/td-p/40370&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 69px;"&gt;
&lt;TD style="width: 30%; height: 69px;"&gt;Protecting IoT (Internet of Things) implementations with R80.10 and later Unified Policy, Protocol Signature, and Segmentation&lt;/TD&gt;
&lt;TD style="width: 70%; height: 69px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Protecting-IoT-Internet-of-Things-implementations/td-p/38405" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Protecting-IoT-Internet-of-Things-implementations/td-p/38405&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Integration with Splunk Phantom&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Integration-with-Splunk-Phantom/td-p/19539" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/Integration-with-Splunk-Phantom/td-p/19539&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Check Point and LogRhythm: Integrated Enterprise Security&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Check-Point-and-LogRhythm-Integrated-Enterprise-Security/td-p/41386" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/Check-Point-and-LogRhythm-Integrated-Enterprise-Security/td-p/41386&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;ClearPass &amp;amp; Checkpoint utilizing RESTful API and RADIUS Accounting&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Integration-with-ClearPass-by-utilising-RESTful-API-and-RADIUS/td-p/41385" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/Integration-with-ClearPass-by-utilising-RESTful-API-and-RADIUS/td-p/41385&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Azure Deployment&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-CloudGuard-Deployment-in-Microsoft-Azure/td-p/52649" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-CloudGuard-Deployment-in-Microsoft-Azure/td-p/52649&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Leveraging Capsule Docs and DLP to provide IRM&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Capsule-Docs/White-Paper-Using-Check-Point-s-Capsule-Docs-with-Data-Loss/m-p/52656" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Capsule-Docs/White-Paper-Using-Check-Point-s-Capsule-Docs-with-Data-Loss/m-p/52656&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Advanced Migration to R80.x Quick Guide&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-R80-x-Advanced-Migration-Quick-Guide/td-p/52671" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-R80-x-Advanced-Migration-Quick-Guide/td-p/52671&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Updating Legacy DHCP Relay To Be R80.10 Ready&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Updating-Legacy-DHCP-Relay-To-Be-R80-10-Ready/td-p/52672" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Updating-Legacy-DHCP-Relay-To-Be-R80-10-Ready/td-p/52672&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Protect ICS SCADA&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/SCADA-Solutions/Protect-ICS-SCADA-Network-Whitepaper/m-p/40878" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SCADA-Solutions/Protect-ICS-SCADA-Network-Whitepaper/m-p/40878&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;URL Filtering using SNI for HTTPS websites&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/td-p/52675" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-using-SNI-for-HTTPS-websites/td-p/52675&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Using AD certificates for outbound SSL inspection&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Policy-Management/White-Paper-Using-Microsoft-Active-Directory-Certificate-for/m-p/52738#M3170" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Policy-Management/White-Paper-Using-Microsoft-Active-Directory-Certificate-for/m-p/52738#M3170&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Deploying CP GW/MGMT with gcloud shell&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Deployment-of-a-Check-Point-gateway-management-in/m-p/52739#M1148" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Deployment-of-a-Check-Point-gateway-management-in/m-p/52739#M1148&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Publishing SmartConsole as a RemoteApp&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Publishing-SmartCconsole-as-a-RemoteApp/m-p/52749#M8686" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Publishing-SmartCconsole-as-a-RemoteApp/m-p/52749#M8686&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Reducing False Positive DLP CGSaaS&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-Reducing-False-Positives-with-DLP-in-CloudGuard-SaaS/m-p/52753#M85" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-Reducing-False-Positives-with-DLP-in-CloudGuard-SaaS/m-p/52753#M85&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;CloudGuard SaaS Threat Prevention&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-CloudGuard-SaaS-Threat-Extraction/td-p/52758" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-CloudGuard-SaaS-Threat-Extraction/td-p/52758&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Managing Threat Prevention IoCs&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Managing-Threat-Prevention-IoCs/td-p/52761" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Managing-Threat-Prevention-IoCs/td-p/52761&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Introduction to Management CLI and JQ&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Introduction-to-Management-API-and-JQ/ba-p/52867#M90" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Introduction-to-Management-API-and-JQ/ba-p/52867#M90&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Endpoint Policy Server in DMZ&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-R80-20-Endpoint-Policy-Server-in-DMZ-for-External/m-p/52865#M1129" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-R80-20-Endpoint-Policy-Server-in-DMZ-for-External/m-p/52865#M1129&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Deploying Endpoint clients via GPO&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-Deploying-an-Endpoint-Client-via-Group-Policy/m-p/52874#M1130" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-Deploying-an-Endpoint-Client-via-Group-Policy/m-p/52874#M1130&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Adding a CloudGuard Cluster into an existing AWS Environment&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Adding-a-CloudGuard-cluster-into-an-existing-AWS/m-p/52876#M1153" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Adding-a-CloudGuard-cluster-into-an-existing-AWS/m-p/52876#M1153&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;AAD compared to NIST&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/SCADA-Solutions/White-Paper-Securing-Industrial-Control-Systems-Check-Point-AAD/m-p/52881#M150" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SCADA-Solutions/White-Paper-Securing-Industrial-Control-Systems-Check-Point-AAD/m-p/52881#M150&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Logging OSPF transitions with syslog&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/Logging-OSPF-FULL-transition-events-to-syslog/m-p/32093#M2573" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/Logging-OSPF-FULL-transition-events-to-syslog/m-p/32093#M2573&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Deploying SMS &amp;amp; a cluster on Azure&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Deploying-an-R80-20-SMS-and-R80-10-Cluster-on-Azure/m-p/52886#M1155" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Deploying-an-R80-20-SMS-and-R80-10-Cluster-on-Azure/m-p/52886#M1155&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Management upgrade workbook&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Security-Management-Server-Upgrade-Workbook/m-p/52890#M8702" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/White-Paper-Security-Management-Server-Upgrade-Workbook/m-p/52890#M8702&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Azure Service Principal Configuration&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-Azure-Service-Principal-Configuration/m-p/53142#M90" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-Azure-Service-Principal-Configuration/m-p/53142#M90&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Phantom integration&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Management-Topics/Integration-with-Splunk-Phantom/td-p/19539" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Management-Topics/Integration-with-Splunk-Phantom/td-p/19539&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&amp;nbsp;Custom SmartEvent Reports&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Custom-SmartEvent-Reports/m-p/53238#M3258" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Custom-SmartEvent-Reports/m-p/53238#M3258&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Updating Endpoint Client Version from EndPoint Management Server&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-Updating-Endpoint-Client-Version-from-EndPoint/m-p/53283#M1144" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Endpoint-Security-Products/White-Paper-Updating-Endpoint-Client-Version-from-EndPoint/m-p/53283#M1144&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;Healthcare: Mobile Security&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/SandBlast-Mobile/White-Paper-Healthcare-Mobile-Security/m-p/53288#" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SandBlast-Mobile/White-Paper-Healthcare-Mobile-Security/m-p/53288#&lt;/A&gt;Healthcare: Mobile Security&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;Configuring NAT64 for Internet Access in R80.20&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-NAT64-for-Internet-Access-in-R80-20/td-p/53315" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-NAT64-for-Internet-Access-in-R80-20/td-p/53315&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;Importing Custom IOC’s in Smart Console R80.20 &lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Importing-Custom-IOC-s-in-SmartConsole-R80-20/m-p/53323#M10628" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Importing-Custom-IOC-s-in-SmartConsole-R80-20/m-p/53323#M10628&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;URL Filtering Best Practices for Large Scale Deployment&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-Best-Practices-for-the-Large-Scale/m-p/53330#M10630" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-URL-Filtering-Best-Practices-for-the-Large-Scale/m-p/53330#M10630&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;SMB Technology Guide&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-Check-Point-Small-Medium-Business-Technology-Guide/m-p/53334#M2093" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-Check-Point-Small-Medium-Business-Technology-Guide/m-p/53334#M2093&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Deploying 1200R Security Gateway with Zero Touch Cloud Service&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/SCADA-Solutions/White-Paper-Deploying-1200R-Security-Gateway-with-Zero-Touch/m-p/53344#M153" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SCADA-Solutions/White-Paper-Deploying-1200R-Security-Gateway-with-Zero-Touch/m-p/53344#M153&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;SandBlast Cloud Office 365 to CloudGuard SaaS for Office 365 Migration&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-SandBlast-Cloud-Office-365-to-CloudGuard-SaaS-for/m-p/53387#M95" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-SaaS/White-Paper-SandBlast-Cloud-Office-365-to-CloudGuard-SaaS-for/m-p/53387#M95&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;TWC/Spectrum VOIP with SMB appliances&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-TWC-Spectrum-VOIP-with-SMB-appliances/m-p/53392#M97" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-TWC-Spectrum-VOIP-with-SMB-appliances/m-p/53392#M97&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;Customer User Center Basics and Strategy&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-UserCenter-Basics-and-Strategy/m-p/53405#M10639" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-UserCenter-Basics-and-Strategy/m-p/53405#M10639&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;&lt;SPAN&gt;How to Batch Categorize URLs&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-How-to-Batch-Categorize-URLs/m-p/53411" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-How-to-Batch-Categorize-URLs/m-p/53411&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 25px;"&gt;
&lt;TD style="width: 30%; height: 25px;"&gt;Security Zones&lt;/TD&gt;
&lt;TD style="width: 70%; height: 25px;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/53415#M10641" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Zones/m-p/53415#M10641&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;How to configure Client Authentication in R80.20&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-Client-Authentication-in-R80-20/m-p/53419#M10642" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-Client-Authentication-in-R80-20/m-p/53419#M10642&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;HTTPS Inspection with Cisco Umbrella&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-HTTPS-Inspection-with-Cisco-Umbrella-How-To/m-p/53421#M10643" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-HTTPS-Inspection-with-Cisco-Umbrella-How-To/m-p/53421#M10643&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Integration of Check Point Identity Collector and Cisco ISE&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Integration-of-Check-Point-Identity-Collector-and/td-p/53429" target="_self"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Integration-of-Check-Point-Identity-Collector-and/td-p/53429&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;SMS and EPM log integration using SmartLog&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-SMS-and-EPM-log-integration-using-SmartLog/m-p/53478#M3265" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-SMS-and-EPM-log-integration-using-SmartLog/m-p/53478#M3265&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Getting out of CPUSE Jumbo Jail&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Getting-out-of-CPUSE-Jumbo-Jail/m-p/53493#M4054" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Enterprise-Appliances-and-Gaia/White-Paper-Getting-out-of-CPUSE-Jumbo-Jail/m-p/53493#M4054&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Distributed IPS Integration with Extreme Networks Network Access Control (NAC)&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/IPS-Anti-Virus-and-Anti-Bot/White-Paper-Distributed-IPS-Integration-with-Extreme-Networks/m-p/53494#M1393" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/IPS-Anti-Virus-and-Anti-Bot/White-Paper-Distributed-IPS-Integration-with-Extreme-Networks/m-p/53494#M1393&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Configuring Check Point Security Gateway with an IPv6 Tunnel Broker&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-Check-Point-Security-Gateway-with-an/m-p/53496#M10666" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Configuring-Check-Point-Security-Gateway-with-an/m-p/53496#M10666&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Updating 1200R Firmware with a USB Stick&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-Updating-1200R-Firmware-with-a-USB-Stick/m-p/53502#M2097" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SMB-Appliances-and-SMP/White-Paper-Updating-1200R-Firmware-with-a-USB-Stick/m-p/53502#M2097&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Security Management Server Migration from R65 to R80.20&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Management-Server-Migration-from-R65-to-R80/m-p/53506#M10671" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Security-Management-Server-Migration-from-R65-to-R80/m-p/53506#M10671&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Ansible Deployment Guide for Check Point&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/White-Paper-Ansible-Deployment-Guide-for-Check-Point/m-p/53514#M3465" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/White-Paper-Ansible-Deployment-Guide-for-Check-Point/m-p/53514#M3465&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Minimizing SBA Notifications with Check Point GuiDBedit&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/SandBlast-Agent/White-Paper-Minimizing-SBA-Notifications-with-Check-Point/m-p/53655#M471" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SandBlast-Agent/White-Paper-Minimizing-SBA-Notifications-with-Check-Point/m-p/53655#M471&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Using RADIUS Authentication for Remote Access VPN&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/53659#M1655" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Using-RADIUS-Authentication-for-Remote-Access-VPN/m-p/53659#M1655&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Check Point Compliance Checking with Secure Configuration Verification&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Check-Point-Compliance-Checking-with-Secure/m-p/57123#M1737" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Check-Point-Compliance-Checking-with-Secure/m-p/57123#M1737&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Check Point Configuration with Radware (Alteon) SSL Decrypt &amp;amp; URL/UserCheck&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Check-Point-Configuration-with-Radware-Alteon-SSL/m-p/57126#M11489" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Check-Point-Configuration-with-Radware-Alteon-SSL/m-p/57126#M11489&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Logging &amp;amp; Monitoring, Events &amp;amp; Reports with R80.10&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Logging-amp-Monitoring-Events-amp-Reports-with-R80/m-p/57128#M3472" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Logging-and-Reporting/White-Paper-Logging-amp-Monitoring-Events-amp-Reports-with-R80/m-p/57128#M3472&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;VSX Migration - Moving one VS at a Time&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/VSX/White-Paper-VSX-Migration-Moving-one-VS-at-a-Time/m-p/57273#M169" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/VSX/White-Paper-VSX-Migration-Moving-one-VS-at-a-Time/m-p/57273#M169&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;R80.20 Endpoint initial Configuration and Setup (CP4B Series)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-R80-20-Endpoint-initial-Configuration-and-Setup/ba-p/57333#M98" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-R80-20-Endpoint-initial-Configuration-and-Setup/ba-p/57333#M98&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Absolute Beginner’s Guide to R80.x&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Absolute-Beginner-s-Guide-to-R80-x/ba-p/57420#M99" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Absolute-Beginner-s-Guide-to-R80-x/ba-p/57420#M99&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Site to Site VPN in R80.x&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Site-to-Site-VPN-in-R80-x/ba-p/57425#M101" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Check-Point-for-Beginners-CP4B/White-Paper-Site-to-Site-VPN-in-R80-x/ba-p/57425#M101&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;P&gt;&lt;SPAN&gt;Implementing Non-FQDN Domain Objects&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Implementing-Non-FQDN-Domain-Objects/td-p/57743" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Implementing-Non-FQDN-Domain-Objects/td-p/57743&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Utilizing GeoProtection and Updatable Objects Within the R80.20 Rulebase&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Utilizing-GeoProtection-and-Updatable-Objects-Within/td-p/57738" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Utilizing-GeoProtection-and-Updatable-Objects-Within/td-p/57738&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Inline Layer Policy Best Practice&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Inline-Layer-Policy-Best-Practice/td-p/57740" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Access-Control-Products/White-Paper-Inline-Layer-Policy-Best-Practice/td-p/57740&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;SPAN&gt;Best Practices and Architecture Recommendations CloudGuard Private IaaS for VMware NSX-T 2.5&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Best-Practices-and-Architecture-Recommendations/td-p/72682" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/CloudGuard-IaaS/White-Paper-Best-Practices-and-Architecture-Recommendations/td-p/72682&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;SPAN&gt;Blueprint for Securing Industrial Control Systems&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Blueprint-for-Securing-Industrial-Control-Systems/m-p/72727#M14739" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Blueprint-for-Securing-Industrial-Control-Systems/m-p/72727#M14739&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="page" title="Page 1"&gt;
&lt;DIV class="section"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;SPAN&gt;SD-WAN Architectural Reference Guide&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/SD-WAN/White-Paper-SD-WAN-Architectural-Reference-Guide/td-p/72730" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/SD-WAN/White-Paper-SD-WAN-Architectural-Reference-Guide/td-p/72730&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Internet Web Access Security Best Practices&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Internet-Web-Access-Security-Best-Practices/m-p/72801#M14764" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Internet-Web-Access-Security-Best-Practices/m-p/72801#M14764&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Identity Awareness in Multi-Domain Environment&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Multi-Domain-Management/White-Paper-Identity-Awareness-in-Multi-Domain-Environment/m-p/72806#M735" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Multi-Domain-Management/White-Paper-Identity-Awareness-in-Multi-Domain-Environment/m-p/72806#M735&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Private ThreatCloud &amp;amp; Offline Gateway Updates&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Private-ThreatCloud-amp-Offline-Gateway-Updates/m-p/72811#M14769" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Private-ThreatCloud-amp-Offline-Gateway-Updates/m-p/72811#M14769&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Secure Remote Access Best Practices in Disaster Recovery Scenarios&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Secure-Remote-Access-Best-Practices-in-Disaster/m-p/79015#M2711" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-Secure-Remote-Access-Best-Practices-in-Disaster/m-p/79015#M2711&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;RAS VPN with Azure and Microsoft Authenticator MFA&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/RAS-VPN-with-Azure-and-Microsoft-Authenticator-MFA/td-p/79527" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/RAS-VPN-with-Azure-and-Microsoft-Authenticator-MFA/td-p/79527&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;How to configure C2S VPN with AzureAD and 2FA&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-How-to-configure-C2S-VPN-with-AzureAD-and-2FA/td-p/80371" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/White-Paper-How-to-configure-C2S-VPN-with-AzureAD-and-2FA/td-p/80371&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;How to Identify DDoS attack on Check Point Gear&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Incident-Response/White-Paper-How-to-Identify-DDoS-attack-on-Check-Point-Gear/ba-p/85052" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Incident-Response/White-Paper-How-to-Identify-DDoS-attack-on-Check-Point-Gear/ba-p/85052&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Path to Secure Cloud Transformation&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-Path-to-Secure-Cloud-Transformation/m-p/88751#M17822" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-Path-to-Secure-Cloud-Transformation/m-p/88751#M17822&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Smart-1 Cloud Solution Brief&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Smart-1-Cloud/White-Paper-Smart-1-Cloud-Solution-Brief/m-p/88902#M1" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Smart-1-Cloud/White-Paper-Smart-1-Cloud-Solution-Brief/m-p/88902#M1&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;CLOUDNATIVE SECURITY - Your Guide to Containers / Kubernetes Security&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security-IaaS/White-Paper-CLOUDNATIVE-SECURITY-Your-Guide-to-Containers/m-p/93246#M2027" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security-IaaS/White-Paper-CLOUDNATIVE-SECURITY-Your-Guide-to-Containers/m-p/93246#M2027&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;SASE Architecture&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/White-Paper-SASE-Architecture/m-p/96575#M19006" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/White-Paper-SASE-Architecture/m-p/96575#M19006&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Security Architecture References for Public Cloud IaaS&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security-IaaS/White-Paper-Security-Architecture-References-for-Public-Cloud/m-p/102525#M2260" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security-IaaS/White-Paper-Security-Architecture-References-for-Public-Cloud/m-p/102525#M2260&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Harmony Mobile API Documentation&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Mobile/Harmony-Mobile-API-Documentation/m-p/124281" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Mobile/Harmony-Mobile-API-Documentation/m-p/124281&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;How to Use Threat Emulation API via the Cloud&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/White-Paper-How-to-Use-Threat-Emulation-API-via-the-Cloud/td-p/125713" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Threat-Prevention/White-Paper-How-to-Use-Threat-Emulation-API-via-the-Cloud/td-p/125713&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Utilizing Mutual TLS Authentication with Log Exporter&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/Utilizing-Mutual-TLS-Authentication-with-Log-Exporter/td-p/179138" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Management/Utilizing-Mutual-TLS-Authentication-with-Log-Exporter/td-p/179138&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;SPAN&gt;Harmony Browse Extension Conflicts&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Browse/Harmony-Browse-Extension-Conflicts/m-p/179678#M37" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Browse/Harmony-Browse-Extension-Conflicts/m-p/179678#M37&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;Automating the First Time Configuration Wizard&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Automating-the-First-Time-Configuration-Wizard/m-p/179689#M32920" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Automating-the-First-Time-Configuration-Wizard/m-p/179689#M32920&lt;/A&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;STRONG&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2022/05/CISO-Guide-to-Ransomware-Prevention-Ebook__.pdf" target="_blank" rel="noopener"&gt;CISO’s Guide to Ransomware eBook&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2022/05/CISO-Guide-to-Ransomware-Prevention-Ebook__.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2022/05/CISO-Guide-to-Ransomware-Prevention-Ebook__.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;STRONG&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2022/06/Prevent-Zero-Day-Threats_Whitepaper.pdf" target="_blank" rel="noopener"&gt;Zero Day Threats: Future-Proofing Your System&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2022/06/Prevent-Zero-Day-Threats_Whitepaper.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2022/06/Prevent-Zero-Day-Threats_Whitepaper.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;STRONG&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/11/WP_OWASP-Top-10_210318.pdf" target="_blank" rel="noopener"&gt;Defending Against the OWASP Top 10&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/11/WP_OWASP-Top-10_210318.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2021/11/WP_OWASP-Top-10_210318.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;&lt;STRONG&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/08/CloudGuard_Dome9.pdf" target="_blank" rel="noopener"&gt;Achieve Comprehensive Control and Visibility for SecOps in Today’s Cloud&lt;/A&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/08/CloudGuard_Dome9.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2021/08/CloudGuard_Dome9.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;P&gt;Phishing Prevention: What To Know About Upgrading Your Strategy&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2022/04/CyberTalk-PhishingStrategy-eBook.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2022/04/CyberTalk-PhishingStrategy-eBook.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD style="width: 30%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/08/SYE_mobile-management-solutions-are-not-security-1.pdf" target="_blank" rel="noopener"&gt;Mobile Management Solutions Are Not Security&lt;/A&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD style="width: 70%;"&gt;
&lt;P&gt;&lt;A href="https://www.cybertalk.org/wp-content/uploads/2021/08/SYE_mobile-management-solutions-are-not-security-1.pdf" target="_blank" rel="noopener"&gt;https://www.cybertalk.org/wp-content/uploads/2021/08/SYE_mobile-management-solutions-are-not-security-1.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 18:44:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53242#M10603</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-05-04T18:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53249#M10604</link>
      <description>It's like ~joe!</description>
      <pubDate>Sun, 12 May 2019 20:03:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53249#M10604</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-12T20:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53251#M10605</link>
      <description>I was really wondering when this would become available, really nice job Valeri.&lt;BR /&gt;Thank you very much.</description>
      <pubDate>Sun, 12 May 2019 20:38:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53251#M10605</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-05-12T20:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53256#M10609</link>
      <description>We have a bunch of these, more will be coming soon.</description>
      <pubDate>Sun, 12 May 2019 23:39:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53256#M10609</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-12T23:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53271#M10613</link>
      <description>&lt;P&gt;Will be waiting for more of it.&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 06:38:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53271#M10613</guid>
      <dc:creator>Alissa20</dc:creator>
      <dc:date>2019-05-13T06:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53276#M10614</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/17364"&gt;@Maarten_Sjouw&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am only doing my simple publishing task. The kudos go to the authors of the papers &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2019 06:54:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53276#M10614</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-05-13T06:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53624#M10715</link>
      <description>&lt;P&gt;Great work and good content.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 19:37:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/53624#M10715</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2019-05-16T19:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/60468#M12243</link>
      <description>excellent repository! congratulations to the entire Check Point team that works to generate these valuable documents.&lt;BR /&gt;&lt;BR /&gt;Just to make it notice, can't acess "Integration of Check Point Identity Collector and Cisco ISE". Please if you can correct it!!.</description>
      <pubDate>Fri, 16 Aug 2019 16:16:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/60468#M12243</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2019-08-16T16:16:27Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/60515#M12257</link>
      <description>We just had the wrong link for the paper there.&lt;BR /&gt;It should be fixed in the list now.</description>
      <pubDate>Sat, 17 Aug 2019 20:03:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/60515#M12257</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-08-17T20:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/110343#M20894</link>
      <description>&lt;P&gt;It's a MUST follow!!!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2021 19:28:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/110343#M20894</guid>
      <dc:creator>MrSaintz</dc:creator>
      <dc:date>2021-02-09T19:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: White Papers Publishing Project</title>
      <link>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/110374#M20896</link>
      <description>&lt;P&gt;Awesome work Val.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 00:37:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/White-Papers-Publishing-Project/m-p/110374#M20896</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-10T00:37:41Z</dc:date>
    </item>
  </channel>
</rss>

