Check Point Collection: Procedures

Document created by RSA Information Design and Development on Jul 23, 2016Last modified by RSA Information Design and Development on Sep 14, 2016
Version 4Show Document
  • View in full screen mode
 

This topic provides an overview of the end-to-end sequential configuration procedure for the Check Point Collection protocol with a checklist that contains each configuration step.

Context

Configuration steps for the Check Point collection protocol must occur in the specific sequence listed in the table below.

Check Point Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                 

Step

Description

1

Configure Check Point Event Sources to Send Events to Security Analytics.

 

2

Configure Check Point Event Sources in Security Analytics.

 

 

3

Start service for configured Check Point collection protocol.

 

 

4

Verify that Check Point Collection is working.

 
You are here: Check Point Collection Configuration Guide > Check Point Collection: Procedures

Attachments

    Outcomes