Working with Security Best Practices
Security Best Practices are the basic building blocks for Regulations and Regulatory Requirements. The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration or policy recommendations.
This section show you how to create, activate and deactivate Security Best Practices for your organization or for specified objects. New and changed Security Best Practices take effect during the next security scan. All Security Best Practices are activated by default.
Dependencies
Some Security Best Practices (parents) are dependent upon the results of other (child) Security Best Practices. When this occurs, the Compliance Blade cannot calculate the compliance level for the parent Security Best Practice unless all child Security Best Practices return a result. If a child Security Best Practice is not , the parent Security Best Practice shows the result as .
Deactivating Security Best Practices
You can deactivate Security Best Practices globally for the organization or for specified objects (gateways, blades or profiles).
To deactivate a Security Best Practice for all of the organization:
- In > , clear the option for the Security Best Practice.
- When prompted, enter an explanation.
A comment is required to show why it is necessary to stop running this Security Best Practice.
- Optional: Define an expiration date.
If you define an expiration date, the deactivated Security Best Practice is automatically reactivated on that date.
To reactivate a Security Best Practice:
- Open > .
De-activated Security Best Practices show in the section.
- Select a Security Best Practice from the list.
- Click .
(Or select the option in the pane.)
To change the comment or expiration date:
Double-click a Security Best Practice in the pane.
To deactivate Security Best Practices for specified gateways:
- Open > .
- In the section, click .
- Enter or select a gateway or cluster.
The selected gateways show in the list.
To remove a gateway from the list:
- Select the gateway.
- Click .
- When prompted, click .
To deactivate a Security Best Practice for a specified object:
- In > , select the Security Best Practice.
- In the section, clear the option for the object.
An object can be a gateway, Policy, profile or other object.
- When prompted, enter an explanation.
A comment is required to show why it is necessary to stop running this Security Best Practice.
- Optional: Define an expiration date.
If you define an expiration date, the deactivated Security Best Practice is automatically reactivated on that date.
To reactivate an object for Security Best Practices:
- Open > .
The de-activated Security Best Practice is in the section.
- Select the Security Best Practice.
- Click .
(Or select the option in of the selected Security Best Practice.)
Running a Manual Scan
We recommend that you run a manual scan after:
- You add objects to your Check Point environment.
- You make changes to IPS protections. Changes to IPS protections are not automatically updated.
- You activate or de-activate a Security Best Practice.
- You add new user defined Best Practices.
- You create a new regulation.
To run a manual scan:
- Open the tab.
- In the Navigation tree, select .
- On the page, click .
Note: While a scan is running, you cannot work with the tab.
|