Check Point

20 articles available

Firewall management, threat prevention, and network security with Check Point

How to Configure Firewall Rules in Check Point SmartConsole

intermediate

Learn how to create and manage firewall rules in Check Point SmartConsole. Step-by-step guide covering access control policies, services, and best practices.

12 minUpdated January 2025
Read Article

How to Configure Anti-Phishing Policies in Harmony Email

intermediate

Step-by-step guide to configure anti-phishing protection, confidence thresholds, and exception lists in Check Point Harmony Email.

12 minUpdated January 2025
Read Article

How to Configure DLP in Harmony Email & Collaboration

intermediate

Learn to configure Data Loss Prevention (DLP) policies in Check Point Harmony Email to protect sensitive data in emails and attachments.

15 minUpdated January 2025
Read Article

How to Configure Attachment Sandboxing (Threat Emulation) in Harmony Email

advanced

Step-by-step guide to configure Threat Emulation sandboxing and Threat Extraction for email attachments in Check Point Harmony Email.

14 minUpdated January 2025
Read Article

How to Configure URL Click-Time Protection in Harmony Email

intermediate

Learn to configure URL rewriting, click-time protection, and link security settings in Check Point Harmony Email & Collaboration.

11 minUpdated January 2025
Read Article

How to Configure Harmony Endpoint Security Policies

intermediate

Configure Check Point Harmony Endpoint security policies including threat prevention, access control, and compliance rules in the Infinity Portal.

15 minUpdated January 2025
Read Article

How to Configure Mobile Threat Defense Policies in Harmony Mobile

advanced

Learn to configure threat defense policies in Check Point Harmony Mobile for network protection, app security, and OS vulnerability detection.

18 minUpdated January 2025
Read Article

How to Connect Harmony Email to Google Workspace

intermediate

Complete guide to integrating Check Point Harmony Email & Collaboration with Google Workspace (Gmail and Google Drive) for email security.

14 minUpdated January 2025
Read Article

How to Connect Harmony Email to Microsoft 365

intermediate

Step-by-step guide to integrate Check Point Harmony Email & Collaboration with Microsoft 365 for advanced email security protection.

12 minUpdated January 2025
Read Article

How to Deploy Check Point Harmony Endpoint Agent

intermediate

Deploy Check Point Harmony Endpoint agent using manual, automatic, or enterprise methods. Complete guide with Infinity Portal steps and troubleshooting.

12 minUpdated January 2025
Read Article

How to Deploy Harmony Mobile to iOS and Android Devices

intermediate

Complete guide to deploying Check Point Harmony Mobile Protect app to iOS and Android devices using MDM, UEM, or manual enrollment.

16 minUpdated January 2025
Read Article

How to Enable Forensic Data Collection in Harmony Endpoint

advanced

Enable and configure forensic data collection in Check Point Harmony Endpoint for detailed attack analysis, incident response, and threat investigation.

11 minUpdated January 2025
Read Article

How to Enable Threat Prevention Blades in Check Point

intermediate

Enable and configure Check Point Threat Prevention including IPS, Anti-Bot, Anti-Virus, and Threat Emulation. Learn profiles, policies, and ThreatCloud integration.

14 minUpdated January 2025
Read Article

How to Investigate Alerts in Harmony Endpoint

advanced

Investigate security alerts in Check Point Harmony Endpoint using threat hunting, forensic analysis, and MITRE ATT&CK mapping in the Infinity Portal.

14 minUpdated January 2025
Read Article

How to Manage Email Quarantine in Harmony Email & Collaboration

intermediate

Learn to manage quarantined emails, configure digest reports, and handle restore requests in Check Point Harmony Email & Collaboration.

10 minUpdated January 2025
Read Article

How to Manage Antivirus Exclusions in Harmony Endpoint

intermediate

Configure antivirus exclusions in Check Point Harmony Endpoint including file, folder, process, and hash-based exclusions in the Infinity Portal.

10 minUpdated January 2025
Read Article

How to Manage Security Policies in Check Point SmartConsole

advanced

Master Check Point security policy management with layers, packages, and best practices. Learn to organize rules effectively and implement role-based access.

16 minUpdated January 2025
Read Article

How to Review Security Reports and Dashboard in Harmony Email

beginner

Learn to navigate the Overview Dashboard, analyze security events, and generate reports in Check Point Harmony Email & Collaboration.

9 minUpdated January 2025
Read Article

How to Set Up Site-to-Site VPN in Check Point

intermediate

Configure site-to-site VPN tunnels between Check Point gateways. Covers IPsec VPN setup, VPN communities, encryption settings, and troubleshooting.

15 minUpdated January 2025
Read Article

How to View Logs and Generate Reports in Check Point SmartConsole

beginner

Master Check Point logging and reporting with SmartConsole and SmartView. Learn to analyze security events, create custom views, and generate automated reports.

11 minUpdated January 2025
Read Article