: Monitor Cybersecurity Events at the Check Point Infinity Portal
Focus
Focus

Monitor Cybersecurity Events at the Check Point Infinity Portal

Table of Contents

Monitor Cybersecurity Events at the Check Point Infinity Portal

In the previous step we confirmed that end-to-end connectivity is working as expected. In this step, we will observe which attacks were prevented by Check Point’s various cybersecurity engines.
  1. Sign in to the Check Point Infinity Portal at https://portal.checkpoint.com.
  2. Once you are logged into the Check Point Infinity Portal, make sure that you are currently looking at the
    Network Security as a Service
    application.
  3. If the title says a name of a different application, click the application switcher icon at the top-left corner ( ) and select
    Network Security as a Service
    .
  4. Navigate to
    Logs
    . The Logs screen will display with 4 different tabs.
  5. Click the
    Cyber Attack View
    tab to observe attacks that were prevented by Check Point.
  6. Click the
    Access Control
    tab to observe malicious applications that were prevented by CheckPoint, as well as total consumed traffic and visibility at the applications that were access the most by your end-users.
  7. Click the
    Application and URL Filtering
    tab to generate a real-time report of your branch office cybersecurity posture. You can export this report to PDF by clicking the
    Menu
    at the top-right.
  8. Navigate to
    Policy
    to view and change your security policy for access control, threat prevention, and HTTPS inspection.
    Changes to security policies are not applied until clicking
    Install Policy
    .

Recommended For You