Check Point Infinity
  • 1 minute to read
  • Print
  • Share
  • Dark
    Light

Check Point Infinity

  • Print
  • Share
  • Dark
    Light

Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices.

The following parameters are required for Check Point Infinity:

  1. Host URL - The hostname of the Check Point Infinity server
  2. Username - The username of a read-only user
  3. Password - The password of a read-only user
  4. Check Point Domain - An optional domain to connect to, within the Check Point Infinity server
  5. Verify SSL - if selected, will verify the ssl certificate of the server
  6. HTTPS Proxy - an optional HTTPS proxy

image.png

Creating a read-only user for Check Point Infinity

Creating a read-only user varies between different versions of Check Point Infinity and instructions for doing so can be found in the Check Point user manual. As a general reference, The following guide can be used to create read-only administrators.

Was this article helpful?