Planning Security Management

Sizing the Security Management Server

This section provides information to help you size a Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. and validate the sizing of an existing environment.

The data required for accurate sizing of the Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.:

You can find guidelines on how to collect the data and identify the appropriate size for your Management Server in sk181782.

For Multi-Domain / Large-scale deployments, refer to sk178325.

We recommend:

  • To use dedicated Management Servers.

  • To use dedicated Log Servers.

  • Configure Management High Availability. You can use standby Management Servers as Log Servers for your gateways

After installing the Security Management Server and Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., you can continue with cyber security configuration for your environment.

Define your Organization's Topology

Network topology consists of network components, both physical and logical, such as physical and virtual Security Gateways, hosts, hand-held devices, CA servers, third-party servers, services, resources, networks, address ranges, and groups. Each of these components corresponds to an object in your Check Point security management configuration. Configure those objects in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.. See Network Object Types.

Define users and user groups that your security environment protects

You can add users and groups to the database manually, through LDAP and User DirectoryClosed Check Point Software Blade on a Management Server that integrates LDAP and other external user management servers with Check Point products and security solutions., or with the help of Active Directory.

To add users: see .

To add groups: see .

To use LDAP and User Directory, see .

To use Active Directory, see .

Define Access Rules for Protection of your Organization's Resources

Configure access rules and group them in policies that are enforced on the Security Gateways. You can define access policies based on traffic, applications, Web sites, and data (see Managing Policies). Set up preventative actions against known threats with Check Point Anti-VirusClosed Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV. and Anti-Malware. Educate users about the validity and security of the operations they attempt with the help of UserCheck. Track network traffic and events through logging and monitoring.

Enforce Access Policies

Configure the Security Gateways. Make sure to activate the appropriate Software Blades. Then, install your policies on the Security Gateways.