This product-specific package includes the resources that support the Perimeter and Network Monitoring use case categories.
Install this package if you collect Check Point FW-1 logs for your ESM.
Release version 2.0 add two new use cases:
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
This release contains the following:
1) Fine-tuned the Rules and the Filter conditions for efficient event evaluation.
2) Updated the package description.
3) Removed 'Check Point Brute Force Login Attempt' and 'Check Point User Created' Rules from the existing package.
4) Provided the scripts to install the new package or update the previous version of 'P-Check Point VPN-1 and FW-1' product package.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox