Showing results for 
Search instead for 
Did you mean: 
Create a Post


Integrating Office 365 and CloudGuard SaaS can be a challenge.


This SecureKnowledge article provides step by step instructions for configuring Office 365 and Centrify with CloudGuard SaaS Authentication Service.

Read more
0 0 110

Health monitoring of your security system is paramount for day to day operations. This SecureKnowledge article provides you a comprehensive guide for configuring SNMP on Gaia OS. 

Read more
0 0 137

The Check Point Falcon Acceleration Cards provide a high performance, low-latency, flexible and scalable solution for Check Point 5900, 6800, 15000, and 23000 appliances.

This SecureKnowledge article provides details about functionalities, pricing, performance boost, installation steps and documentation.

Read more
0 0 424

Configuring CloudGuard SaaS for your cloud services requires understanding of the functionality, operation modes, limitations and best practices.

If you are looking to enable CloudGuard SaaS for your Gmail system, use this SecureKnowledge article for guidance.

Read more
1 0 417

Recently Microsoft has announced that a critical vulnerability was found in Remote Desktop Services (RDS) relevant to several Windows products, including Windows 7 and Windows Server 2008. Here at Check Point, we have already seen many scanning attempts and successfully blocked them with our protections.


For the comprehensive list of protective actions, go to sk154732 - How to protect RDP servers from CVE-2019-0708 (BlueKeep)?

Read more
1 0 622

SandBlast Agent is a complete endpoint security solution offering a fleet of advanced endpoint threat prevention capabilities so you can safely navigate through today’s menacing threat landscape.

Whether you are using it already or just planning to, take a look at SandBlast Best Practices article, to make sure your settings are optimal.



Read more
0 0 285

Whether your organization is a subject of some of the numerous compliance regulations, or you just want to make sure you adhere to Check Point Best Practices when managing your security policies, Compliance Software Blade is your tool.

Compliance Blade ATRG describes all aspects of the tool, from basic settings and capabilities, to advanced operations and troubleshooting. 

Read more
1 0 257

SNMP stands for Simple Network Monitoring Protocol, but in fact it is not so simple. If you are looking for SNMP Best Practices, we have just the document you need

Read more
0 0 564

Check Point's comprehensive Threat Prevention solution helps protect networks from today's sophisticated malware and cyber-attacks. 

But once an attack or malware incident is identified and prevented, what are you going to do next? Ask yourself these questions:

  • How can I investigate if a host is truly infected?
  • What is the nature of the threat?
  • Are there additional infected hosts in my network?

Threat Prevention Software Blades can help you with finding answers. For more information, refer to SecureKnowledge article sk100633.

Documentation available there for download will help you to identify, investigate, review and re-mediate security incidents related to the Threat Prevention events.

Read more
3 1 493

In R77.x and earlier versions, it was possible to migrate a standalone gateway (management + firewall on same appliance) to a distributed configuration (where gateway and management are on different appliances).
Thanks to @Jim_Oqvist and @Dima_M, we now have a supported procedure for this on R80.x: sk154033: How to migrate R80.x standalone management environment to a distributed environment

Read more
1 5 905