Contents
Important Information
Check Point ICS Security User Guide
Overview
Using ICS Applications in the Policy
SMB Appliances - Centrally Managed
SMB Appliances - Locally Managed
Logs
Troubleshooting
Appendix A
Appendix B