Check Point
20 articles available
Firewall management, threat prevention, and network security with Check Point
How to Configure Firewall Rules in Check Point SmartConsole
intermediateLearn how to create and manage firewall rules in Check Point SmartConsole. Step-by-step guide covering access control policies, services, and best practices.
How to Configure Anti-Phishing Policies in Harmony Email
intermediateStep-by-step guide to configure anti-phishing protection, confidence thresholds, and exception lists in Check Point Harmony Email.
How to Configure DLP in Harmony Email & Collaboration
intermediateLearn to configure Data Loss Prevention (DLP) policies in Check Point Harmony Email to protect sensitive data in emails and attachments.
How to Configure Attachment Sandboxing (Threat Emulation) in Harmony Email
advancedStep-by-step guide to configure Threat Emulation sandboxing and Threat Extraction for email attachments in Check Point Harmony Email.
How to Configure URL Click-Time Protection in Harmony Email
intermediateLearn to configure URL rewriting, click-time protection, and link security settings in Check Point Harmony Email & Collaboration.
How to Configure Harmony Endpoint Security Policies
intermediateConfigure Check Point Harmony Endpoint security policies including threat prevention, access control, and compliance rules in the Infinity Portal.
How to Configure Mobile Threat Defense Policies in Harmony Mobile
advancedLearn to configure threat defense policies in Check Point Harmony Mobile for network protection, app security, and OS vulnerability detection.
How to Connect Harmony Email to Google Workspace
intermediateComplete guide to integrating Check Point Harmony Email & Collaboration with Google Workspace (Gmail and Google Drive) for email security.
How to Connect Harmony Email to Microsoft 365
intermediateStep-by-step guide to integrate Check Point Harmony Email & Collaboration with Microsoft 365 for advanced email security protection.
How to Deploy Check Point Harmony Endpoint Agent
intermediateDeploy Check Point Harmony Endpoint agent using manual, automatic, or enterprise methods. Complete guide with Infinity Portal steps and troubleshooting.
How to Deploy Harmony Mobile to iOS and Android Devices
intermediateComplete guide to deploying Check Point Harmony Mobile Protect app to iOS and Android devices using MDM, UEM, or manual enrollment.
How to Enable Forensic Data Collection in Harmony Endpoint
advancedEnable and configure forensic data collection in Check Point Harmony Endpoint for detailed attack analysis, incident response, and threat investigation.
How to Enable Threat Prevention Blades in Check Point
intermediateEnable and configure Check Point Threat Prevention including IPS, Anti-Bot, Anti-Virus, and Threat Emulation. Learn profiles, policies, and ThreatCloud integration.
How to Investigate Alerts in Harmony Endpoint
advancedInvestigate security alerts in Check Point Harmony Endpoint using threat hunting, forensic analysis, and MITRE ATT&CK mapping in the Infinity Portal.
How to Manage Email Quarantine in Harmony Email & Collaboration
intermediateLearn to manage quarantined emails, configure digest reports, and handle restore requests in Check Point Harmony Email & Collaboration.
How to Manage Antivirus Exclusions in Harmony Endpoint
intermediateConfigure antivirus exclusions in Check Point Harmony Endpoint including file, folder, process, and hash-based exclusions in the Infinity Portal.
How to Manage Security Policies in Check Point SmartConsole
advancedMaster Check Point security policy management with layers, packages, and best practices. Learn to organize rules effectively and implement role-based access.
How to Review Security Reports and Dashboard in Harmony Email
beginnerLearn to navigate the Overview Dashboard, analyze security events, and generate reports in Check Point Harmony Email & Collaboration.
How to Set Up Site-to-Site VPN in Check Point
intermediateConfigure site-to-site VPN tunnels between Check Point gateways. Covers IPsec VPN setup, VPN communities, encryption settings, and troubleshooting.
How to View Logs and Generate Reports in Check Point SmartConsole
beginnerMaster Check Point logging and reporting with SmartConsole and SmartView. Learn to analyze security events, create custom views, and generate automated reports.