Introduction to Quantum Security Management

Check Point offers effective Security Management solutions to help you keep up with constantly growing needs and challenges of your organizational network. This Administration Guide focuses on the basic Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. deployment.

If you are interested in deployments for organizations with multiple sites, refer to the R82 Multi-Domain Security Management Administration Guide.

These are the basic components of Check Point security architecture.

Item

Description

1

SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. - Check Point Graphical User Interface for connection to and management of Security Management Servers.

2

Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. - Manages Security Gateways with defined security policiesClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. and monitors security events on the network.

3

Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. - Placed at the perimeter of the network topology, to protect your environment through enforcement of the security policies.

4

Your environment to protect.

Workflow for Configuring Security Management

  1. Log in to the Security Management Server. See Connecting to the Security Management Server through SmartConsole

  2. Configure the Security Management Server and Security Gateways in your environment. See Configuring the Security Management Server and Security Gateways

  3. Define the administrators of your environment. See Managing Administrator Accounts.

  4. Assign permissions to the administrators of your environment. See Assigning Permission Profiles to Administrators

  5. Define users and user groups that your security environment protects. See Managing User Accounts.

  6. Configure the physical and virtual network components in your environment. See Managing Objects

  7. Configure access rules that govern the protection of your organization's resources. See Creating an Access Control Policy

  8. Install Policy. See Installing the Access Control Policy.