: Monitor Cybersecurity Events at the Check Point Infinity Portal
Focus
Focus

Monitor Cybersecurity Events at the Check Point Infinity Portal

Table of Contents

Monitor Cybersecurity Events at the Check Point Infinity Portal

In the previous step we confirmed that end-to-end connectivity is working as expected. In this step, we will observe which attacks were prevented by Check Point’s various cybersecurity engines.
  1. Sign in to the Check Point Infinity Portal at https://portal.checkpoint.com.
  2. Once you are logged into the Check Point Infinity Portal, make sure that you are currently looking at the Network Security as a Service application.
  3. If the title says a name of a different application, click the application switcher icon at the top-left corner (
    ) and select Network Security as a Service.
  4. Navigate to Logs. The Logs screen will display with 4 different tabs.
  5. Click the Cyber Attack View tab to observe attacks that were prevented by Check Point.
  6. Click the Access Control tab to observe malicious applications that were prevented by CheckPoint, as well as total consumed traffic and visibility at the applications that were access the most by your end-users.
  7. Click the Application and URL Filtering tab to generate a real-time report of your branch office cybersecurity posture. You can export this report to PDF by clicking the Menu at the top-right.
  8. Navigate to Policy to view and change your security policy for access control, threat prevention, and HTTPS inspection.
    Changes to security policies are not applied until clicking Install Policy.