Print Download PDF Send Feedback

Terms

Administrator

A SmartConsole user with permissions to manage Check Point security products and the network environment.

Audit Log

A record of an action that is done by an Administrator. See also Log.

Cluster

Two or more Security Gateways that work together in a redundant configuration - High Availability.

Cluster Member

A Security Gateway that is part of a cluster.

Configure

To select or to enter values that change how a product works.

Cooperative Enforcement

Integration of Endpoint Security server compliance to verify internal network connections.

Correlation Unit

A SmartEvent software component that analyzes logs and detects events.

Custom Report

A user defined report for a Check Point product, typically based on a predefined report.

Database

The Check Point database includes all objects, including network objects, users, services, servers, and protection profiles.

DLP

Data Loss Prevention. Detects and prevents the unauthorized transmission of confidential information.

Event

A record of a security or network incident that is based on one or more logs, and on a customizable set of rules that are defined in the Event Policy.

Event Correlation

A procedure that extracts, aggregates, correlates and analyses events from the logs.

Event Policy

A set of rules that define the behavior of SmartEvent.

External Network

Computers and networks that are outside of the protected network.

See also

Internal Network

Internal Network

Computers and resources protected by the Firewall and accessed by authenticated users.

See also

External Network

IPS

Intrusion Prevention System. Check Point Software Blade that inspects and analyzes packets and data for numerous types of risks.

Log

A record of an action that is done by a Software Blade. 

Log Server

Physical server that hosts Check Point product log files.

Management Server

A Check Point Security Management Server or a Multi-Domain Server.

Network

1. A configuration of nodes and connecting branches. 2. A site of machines, services, and the links (physical, virtual, wireless, encrypted) that connect them.

Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

Predefined Report

A default report included in a Check Point product that you can run right out of the box.

Remote Access VPN

An encryption tunnel between a Security Gateway and remote access clients, such as Endpoint Security VPN, and communities.

Report

A summary of network activity and Security Policy enforcement that is generated by Check Point products such as SmartEvent.

Security Cluster

A cluster that has identical Check Point Security Gateway members for High Availability and Load Sharing.

Security Gateway

A computer that runs Check Point software to inspect traffic and enforces Security Policies for connected network resources.

Security Management Server

A computer that runs Check Point software to manage the objects and policies in Check Point environment.

Security Policy

A collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.

SmartConsole

A Check Point GUI application used to manage Security Policies, monitor products and events, install updates, provision new devices and appliances, and manage a multi-domain environment and each domain.

SmartEvent Server

Physical server that hosts the events database.

Software Blade

A software blade is a security solution based on specific business needs.

Each blade is independent, modular and centrally managed. To extend security, additional blades can be quickly added.

System Counter

SmartConsole data or report on status, activity, and resource usage of Check Point products.

Traffic

The flow of data between network devices.

VPN

Virtual Private Network. A secure, encrypted connection between networks and remote clients on a public infrastructure, to give authenticated remote users and sites secured access to an organization's network and resources.

VPN Tunnel

An encrypted connection between two hosts using standard protocols (such as L2TP) to encrypt traffic going in and decrypt it coming out, creating an encapsulated network through which data can be safely shared as though on a physical private line.