- Products
- Learn
- Local User Groups
- Partners
- More
The State of Ransomware Q1 2026
Key Trends and Their Impact
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
The standard Application and URL Filtering report should provide you who is using the most bandwidth.
However, for that report to be effective, you have to log the relevant Access Policy rules with Detailed/Extended logging.
The more specifics you can provide around lack of (perceived) functionality, the more we can help.
This might also be a good conversation to have with your local Check Point SE.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY