CCMA's blog

This is a professional blog of Check Point Certified Master Architect (CCMA). It does not represent position of my current employer.

Saturday, April 12, 2014

Kernel debug flags revealed

›
As I have been advised yesterday night, Check Point has published another extremely interesting document: Kernel Debug Flags . It is a comp...
3 comments:
Wednesday, April 2, 2014

Forwarding Management logs from CMAs to CLMs

›
If you only log your GWs to CLMs and not to CMAs, it is not exactly convenient having Management audit logs still residing on CMAs. ...
Friday, March 28, 2014

iPad Document security - follow up

›
Some people from Check Point are still sending me private messages concerning my post about document security iPad app . Some even try to m...
3 comments:
Thursday, March 27, 2014

Transparent Kerberos SSO with multiple GWs

›
Check Point Identity Awareness is a neat feature, especially with browser based transparent SSO authentication. It is also a challenging on...
2 comments:
Monday, March 17, 2014

Great collections of Check Point "How to" links

›
If you have not seen it yet, there is a great collection of "how to" solutions and guides in SK65385 . It has been last updated 1...
8 comments:
Thursday, March 6, 2014

Stay away from Document security app on iPad

›
I have had to install Check Point Document Security application on my iPad the other night. I did not want to, but Check Point guys have se...
Monday, March 3, 2014

3D Security report tool is now fully integrated into R77.10

›
If you have been following my posts about 3D Security Analysis Report tool , there are good news. Check Point has made an effort to integra...
‹
›
Home
View web version

About Me

My photo
Valeri Loukine
Techniques, methods and tools described in this blog may require advanced expertise to use. Some information presented here may be incorrect or incomplete. Use it on your own risk. Author is not liable in case of any damage. For resolution of your technical issues related to Check Point Software Technologies products and systems always follow standard support procedures.
View my complete profile
Powered by Blogger.