Log Collection Check Point: Procedures

Document created by RSA Information Design and Development on Jul 29, 2016
Version 1Show Document
  • View in full screen mode
 

Configuration steps for the Check Point collection protocol must occur in the specific sequence listed in the table below.

Check Point Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                         

Step

Description

checkmark.PNG
1

Configure Check Point Event Sources to Send Events to Security Analytics.

 
2

Configure Check Point Event Sources in Security Analytics.

 

3

Start service for configured Check Point collection protocol.

 

4

Verify that Check Point Collection is working.

 
You are here: Check Point Collection Configuration Guide > Log Collection Check Point: Procedures

Attachments

    Outcomes