Monitor Cybersecurity Events at the Check Point Infinity
Portal
In the previous step we confirmed that end-to-end
connectivity is working as expected. In this step, we will observe
which attacks were prevented by Check Point’s various cybersecurity
engines.
Once you are logged into the Check Point Infinity Portal,
make sure that you are currently looking at the
Network
Security as a Service
application.
If the title says a name of a different application,
click the application switcher icon at the top-left corner (
) and select
Network
Security as a Service
.
Navigate to
Logs
. The Logs screen
will display with 4 different tabs.
Click the
Cyber Attack View
tab
to observe attacks that were prevented by Check Point.
Click the
Access Control
tab to
observe malicious applications that were prevented by CheckPoint,
as well as total consumed traffic and visibility at the applications
that were access the most by your end-users.
Click the
Application and URL Filtering
tab
to generate a real-time report of your branch office cybersecurity
posture. You can export this report to PDF by clicking the
Menu
at
the top-right.
Navigate to
Policy
to view and
change your security policy for access control, threat prevention,
and HTTPS inspection.
Changes to security policies are not applied until
clicking