Print Download Complete help as Archive Send Feedback

Previous

Next

Security Best Practices

What can I do here?

Use this window to activate or deactivate Security Best Practices relevant to your organization.

Getting Here

Getting Here - Logs & Monitor > Open Compliance View > Security Best Practices Compliance > See all

Best Practice Types

The Check Point Compliance Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. A Security Best Practice is related to specified regulations in different regulatory standards. It tells you about your compliance status and recommends corrective steps.

Types of Security Best Practices

Search and Export Fields

Pane Sections