- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Every month, we shine a light on powerful features in Quantum Security Management’s SmartConsole that make your job easier, your environment cleaner, and your decisions sharper. These aren’t add-ons - they’re already included in your system, just waiting to be used.
This month, we’re spotlighting four features that every security admin should start using today.
What it is:
Hit Count in the rulebase shows how frequently each rule in your Access Control or NAT policy matches traffic. You can view counts as numerical values, percentages of total traffic, or tiered levels (Very High, High, Medium, Low, Zero).
Use cases:
Why you’ll love it: 💛
🆕 New in R82.10 and from R82 Jumbo Take 36
One of the most anticipated enhancements: you can now search rulebases by hit count values (both Access and NAT policies) directly in SmartConsole and the Management API.
Example: quickly find all Zero-hit rules for cleanup, or all rules exceeding 10,000 hits.
This capability streamlines audits and large-scale policy tuning.
How to view & filter Hit Count in the rulebase:
Documentation & References
Also supported in the latest Web SmartConsole release for both SMC and MDS. Requires the latest Jumbo Hotfix update.
Hits column in policy:
Search by hits:
----------
What it is:
Many admins are familiar with the Where Used feature - it instantly shows every location where a specific object is used, whether in Access Control policies, NAT rules, groups, or elsewhere. What fewer people realize is that you can go a step further:
Use Cases:
Why You'll Love It: 💛
How to Use It:
Right click on object:
Where Used menu:
----------
What it is
The Session Take-Over feature in Check Point SmartConsole allows administrators to assume control of another user's session.
This is particularly useful when sessions are left open, potentially blocking critical changes or when an administrator is unavailable.
Use Cases:
Why You'll Love It: 💛
How to Use It:
Note: The ability to take over sessions requires appropriate permissions configured in your user profile.
Take over menu:
Operation completed:
View on the other session side:
----------
What it is:
Custom Views in SmartView allow administrators to create personalized dashboards that display specific data relevant to their monitoring needs. These views can include real-time traffic statistics, system counters, VPN tunnel statuses, and more.
Use Cases:
Why You'll Love It: 💛
How to Create a Custom View:
New View:
Example to new view:
Each of these four tools is already part of your Quantum Security Management platform:
Whether it’s cleaning up your policy, responding faster in emergencies, or improving visibility, these tools help you work smarter.
Start using these features today.
Have feedback or a feature you’d like to see next month? Drop us a line at QuantumMgmt‑Feedback@checkpoint.com .
Missed our first spotlight? Catch up here:.
This Month's Spotlight: 3 Features You Should Start Using Today
Let me add here what you should STOP using.
1. Install-on field on rules.
Create a separate policy for each security gateway/cluster.
2. Manual NAT-rules
Use manual NAT only for complex NAT where you will have to translate source and destination or port.
In all other cases use automatic NAT. It keeps your environment a lot less complex.
3. Rules that have tens of objects
Consolidate rules when possible, use simple object groups (avoid nested groups though) and allow access based on identities instead of IP-addresses.
4. Large policies with no structure
Use unified policies with inline layers, use section headers and add a comment to each rule.
5. Ordered layers
Use unified policies rather than having a separate policy for every access control blade
Great tips!
2. Manual NAT-rules
Use manual NAT only for complex NAT where you will have to translate source and destination or port.
In all other cases use automatic NAT. It keeps your environment a lot less complex.
I really don't agree with this.
A lot of admins totally abuse automatic NAT, enabling it on each and every internal object (including host objects!), and soon the rules list is a complete unreadable mess, filled with literally hundreds of rules.
Using automatic NAT on large networks objets is okayish, but if you happen to use a lot of subnets on your internal networks, this quickly gets messy as well.
IMHO, it's much cleaner to use clearly named groups in NAT rules, and keep the rule count as low as possible.
I get your point. Automatic NAT can definitely get messy if it’s just switched on for every object without thinking, and I’ve seen those environments too. But I’ve also walked into sites with hundreds or even thousands of manual NAT rules, and those are just as painful to manage long-term.
For me, it comes down to using the right tool for the right job:
Automatic NAT works really well for simple source or destination translations. Keeping the NAT tied to the object makes it easier for most admins to follow and reduces overhead.
Manual NAT is the way to go when you need something more complex—source and destination together, port translations, or special cases. The flexibility is there, but you usually end up dealing with proxy ARP and extra steps.
So yes, automatic NAT can be abused, but when used properly it keeps things much cleaner. Manual NAT definitely has its place, but for most straightforward cases, automatic NAT usually makes life a lot easier.
Is there an API option to the replace feature? I did not see that option in the API guide.
API for "replace where-used" will arrive in one of the upcoming JHFs.
We added it to enable this functionality in an upcoming Web SmartConsole as well.
Immediately after reading the tips I was searching through the API documentation for the replace feature and wanted to ask the same question. 😂
Thanks for sharing.
You can also find new views/reports in SmartEvent toolbox in the following link:
https://community.checkpoint.com/t5/SmartEvent/bd-p/SmartEvent
You wrote: Optimize performance: Shift high-traffic rules upward to improve efficiency.
Afaik this is not important anymore with the new matchong algorithms ?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
14 | |
4 | |
4 | |
3 | |
3 | |
3 | |
2 | |
2 | |
2 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY