- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Managing security policy changes with R80.10
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Managing security policy changes with R80.10
R80.10 provides a whole slew of new tools and features that helps a security administrator in his/her job. One of those tools is known to the long time users called "Where Used". What is new is that you can now replace objects found through "Where Used" easily by using the "Replace" feature. Watch this video to find out how it all works.
We would like to know what other topics you'd be interested in seeing here.
0 Replies
