In this session, we provided an overview of how the Check Point Compliance Blade can verify your security management configuration is compliant to your organizations's requirements. Specifically, we will cover the following:
- Get alerted when a configuration violates security best practices
- Fix the misconfiguration, modify the best practice, or create an exception for this instance and follow-up on it later
- Ensure your best practices are compliant with specific regulations
- Q&A regarding supported contents and roadmap
Hi guys, some useful links:
Short tutorials: Compliance Blade how-to videos
Advanced technical guide: ATRG: Compliance Blade (R80.10 and above)
The live Q&A may have ended, but we are still here to answer all your questions regarding Security Best Practices at Check Point products.