Check Point Collection: Procedures

Document created by RSA Information Design and Development on May 9, 2016Last modified by RSA Information Design and Development on May 4, 2017
Version 6Show Document
  • View in full screen mode
  

This topic provides an overview of the end-to-end sequential configuration procedure for the Check Point Collection protocol with a checklist that contains each configuration step.

Context

Configuration steps for the Check Point collection protocol must occur in the specific sequence listed in the table below.

Check Point Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                 

Step

Description

1

Configure Check Point Event Sources to Send Events to Security Analytics.

 

2

Configure Check Point Event Sources in Security Analytics.

 

 

3

Start service for configured Check Point collection protocol.

 

 

4

Verify that Check Point Collection is working.

 
Previous Topic:The Basics
You are here
Table of Contents > Check Point Collection Configuration Guide > Procedures

Attachments

    Outcomes