<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Checkup in R80 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16278#M2736</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Mobile Security Report is also great, you can easily detect some apps and out dated mobile devices in your network, that report recomends to have Sandblast Mobile for a complete protection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Aug 2018 04:41:48 GMT</pubDate>
    <dc:creator>Pablo_Barriga</dc:creator>
    <dc:date>2018-08-13T04:41:48Z</dc:date>
    <item>
      <title>Security Checkup in R80</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16276#M2734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently I came to know the wonderful feature in R80.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Reporting part, there are some pre-defined report of checkpoint. There are 3 reports of Security Checkup in which you find below information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Malware Infection and affected machines&lt;/LI&gt;&lt;LI&gt;High Risk Web Applications&lt;/LI&gt;&lt;LI&gt;Intrusion attempts and Bot attacks&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Affected machines with Vulnerabilities for reference.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are really great reports which cover almost all prevention measures and you can come to know suspicious activities happening in your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67901_Capture1.JPG" /&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 13:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16276#M2734</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-08-06T13:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Security Checkup in R80</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16277#M2735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These reports are the ones used when running the appliance as a Security Check Up appliance so that it just monitors a port mirror or bridge to see what is happening on a network before some "proper" security is put in place!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 14:51:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16277#M2735</guid>
      <dc:creator>Stuart_Green</dc:creator>
      <dc:date>2018-08-06T14:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: Security Checkup in R80</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16278#M2736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Mobile Security Report is also great, you can easily detect some apps and out dated mobile devices in your network, that report recomends to have Sandblast Mobile for a complete protection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Aug 2018 04:41:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Checkup-in-R80/m-p/16278#M2736</guid>
      <dc:creator>Pablo_Barriga</dc:creator>
      <dc:date>2018-08-13T04:41:48Z</dc:date>
    </item>
  </channel>
</rss>

