Security Best Practices
What can I do here?
Use this window to activate or deactivate Security Best Practices relevant to your organization.
|
Getting Here - Logs & Monitor > Open Compliance View > Security Best Practices Compliance > See all
|
Best Practice Types
The Check Point Compliance Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. A Security Best Practice is related to specified regulations in different regulatory standards. It tells you about your compliance status and recommends corrective steps.
Types of Security Best Practices
- Global - Examines the configuration settings for all of the organization.
- Object-based - Examines the configuration settings for specified objects (gateways, profiles and other objects).
Search and Export Fields
- - Enter search criteria to show only those results that match specified criteria. You can do a free text search for criteria in all fields or search for values in a specified field.
- - Select a value to show the results in groups of a specified.
Pane Sections
- s - Name of the Security Best Practice, status, score, and other data.
- - Detailed description of the selection, with its action item (if there is one).
- - Objects related to the selected and their status. You can activate or deactivate enforcement of the selected Security Check for specific objects. This section shows only when the selected Security Best Practice is applicable to specific objects.
- - List of regulatory standards that include the selected Security Best Practice.