- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello Chack Mates,
I have a problem, and I need your advice. I found a job that I have been seeking for a long time. There is a big customer who has got a lot of Checkpoint appliances. But they also have some security rules about personal information. And sometimes, my hands are tied when I can't send some information that TAC needs to solve a problem. For instance, I found a core dump file. It contains IP addresses, object names, and I also suspect that it contains usernames e.t.c. And I can't send it to them. Does anyone have experience of working with a client like this one? What should I do?
First I was thinking to write a parser. But to find all information that I need to remove, I have to know what to search. It's easy to remove IP addresses. The regular expression to find them is easy to write. But there might be a lot of other personal information. It's impossible to create all templates.
The core dump is usually needed to see the stack trace. You may try to ask TAC for a remote session to extract this stack trace from the core dump right in the appliance or on some other machine suitable for that.
Several points:
I have been in situations where end customers could not provide appropriate means of support to security vendors. In some occasions, I had to be eyes and ears to support on customers' sites where no files could be sent and no remote access possible. Not the best experience.
Usually that costs time, efforts, much more money and frustration. Yet, sometimes there is nothing you can do about it.
Hi
My name is Galit Sadi and I am the TAC Project Manager
I would be happy to take it offline and try to assist you.
Please contact me at galits@checkpoint.com
Thx
Galit
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY