This topic provides an overview of the end-to-end sequential configuration procedure for the Check Point Collection protocol with a checklist that contains each configuration step.
Context
Configuration steps for the Check Point collection protocol must occur in the specific sequence listed in the table below.
Check Point Configuration Checklist
Note: The steps in this list are in the order in which you must complete them.
Previous Topic:The Basics
You are here
Table of Contents > Check Point Collection Configuration Guide > Procedures