Getting Started
Before you deploy a Check Point security solution, familiarize yourself with:
-
Basic setup of a Check Point Security Management Server
Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. -
Basic setup of Check Point Security Gateways
-
Administrative task delegation
-
Security management in a non-GUI environment
Workflow for Configuring Security Management
-
Log in to the Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server.. See Connecting to the Security Management Server with SmartConsole. -
Configure the Security Management Server and Security Gateways in your environment. See Configuring the Security Management Server and Security Gateways.
-
Define the administrators of your environment. See Managing Administrator Accounts.
-
Assign permissions to the administrators of your environment. See Assigning Permission Profiles to Administrators.
-
Define users and user groups that your security environment protects. See Managing User Accounts
-
Configure the physical and virtual network components in your environment. See Managing Objects.
-
Configure access rules that govern the protection of your organization's resources. See Creating an Access Control Policy.
-
Install Policy. See Installing the Access Control Policy.