- Products
- Learn
- Local User Groups
- Partners
- More
Access Control and Threat Prevention Best Practices
5 November @ 5pm CET / 11am ET
Ask Check Point Threat Intelligence Anything!
October 28th, 9am ET / 3pm CET
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
Spark Management Portal and More!
Just as a reference, things I usually point out to people in cases like this
-always check monitoring blade, if its enabled
-if monitoring blade is not enabled, see if any report can be generated (though you may need to have smart event enabled for that)
-in some cases, compliance blade may also help, though that needs additional license applied to the management server
-commands such as fw ctl multik print_heavy_conn or cpview (just tab between different fields) can also be useful
-cpstat command can also give some insight, when you run it, it gives all the options/ So say you could run cpstat fw -f all, you run command from 2nd row and then -f and flag from last column in the table (its very useful)
Hope that helps.
Have a nice weekend!
Andy
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY