Getting Started

Before you deploy a Check Point security solution, familiarize yourself with:

Workflow for Configuring Security Management

  1. Log in to the Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.. See Connecting to the Security Management Server with SmartConsole.

  2. Configure the Security Management Server and Security Gateways in your environment. See Configuring the Security Management Server and Security Gateways.

  3. Define the administrators of your environment. See Managing Administrator Accounts.

  4. Assign permissions to the administrators of your environment. See Assigning Permission Profiles to Administrators.

  5. Define users and user groups that your security environment protects. See Managing User Accounts

  6. Configure the physical and virtual network components in your environment. See Managing Objects.

  7. Configure access rules that govern the protection of your organization's resources. See Creating an Access Control Policy.

  8. Install Policy. See Installing the Access Control Policy.