Introduction to Security Management

Check Point offers effective Security Management solutions to help you keep up with constantly growing needs and challenges of your organizational network. This Administration Guide focuses on the basic Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. deployment.

If you are interested in deployments for organizations with multiple sites, refer to the R80.40 Multi-Domain Security Management Administration Guide.

These are the basic components of Check Point security architecture.

Item

Description

1

SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. - Check Point Graphical User Interface for connection to and management of Security Management Servers.

2

Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. - Manages Security Gateways with defined security policiesClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. and monitors security events on the network.

3

Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. - Placed at the perimeter of the network topology, to protect your environment through enforcement of the security policies.

4

Your environment to protect.