Check Point Collection: Procedures

Document created by RSA Information Design and Development on Jun 25, 2017Last modified by RSA Information Design and Development on Jul 28, 2017
Version 2Show Document
  • View in full screen mode
  

This topic provides an overview of the end-to-end sequential configuration procedure for the Check Point Collection protocol with a checklist that contains each configuration step.

Context

Configuration steps for the Check Point collection protocol must occur in the specific sequence listed in the table below.

Check Point Configuration Checklist

Note: The steps in this list are in the order in which you must complete them.

                                 

Step

Description

1

Configure Check Point Event Sources to Send Events to Security Analytics.

 

2

Configure Check Point Event Sources in Security Analytics.

 

 

3

Start service for configured Check Point collection protocol.

 

 

4

Verify that Check Point Collection is working.

 
Previous Topic:The Basics
You are here
Table of Contents > Check Point Collection Configuration Guide > Procedures

Attachments

    Outcomes