Monitor Cybersecurity Events at the Check Point Infinity
Portal
In the previous step we confirmed that end-to-end
connectivity is working as expected. In this step, we will observe
which attacks were prevented by Check Point’s various cybersecurity
engines.
Once you are logged into the Check Point Infinity Portal,
make sure that you are currently looking at the Network
Security as a Service application.
If the title says a name of a different application,
click the application switcher icon at the top-left corner (
) and select Network
Security as a Service.
Navigate to Logs. The Logs screen
will display with 4 different tabs.
Click the Cyber Attack View tab
to observe attacks that were prevented by Check Point.
Click the Access Control tab to
observe malicious applications that were prevented by CheckPoint,
as well as total consumed traffic and visibility at the applications
that were access the most by your end-users.
Click the Application and URL Filtering tab
to generate a real-time report of your branch office cybersecurity
posture. You can export this report to PDF by clicking the Menu at
the top-right.
Navigate to Policy to view and
change your security policy for access control, threat prevention,
and HTTPS inspection.
Changes to security policies are not applied until
clicking Install Policy.