- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hi all and thank you for input,
just an easy one; looking at a Card from the Threat Prevention log, I am a bit confused by the difference between the 'Resource' field (in the Forensics Details section) and the 'Destination' (in the Traffic section). What does the 'Resource' really reveal? I understand that the 'Suppressed Logs' number signifies a number of attempted connections, is that right?
Thanks, Tim
Thanks PhoneBoy
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY