Checkpoint Infinity
  • 1 minute to read
  • Print
  • Share
  • Dark
    Light

Checkpoint Infinity

  • Print
  • Share
  • Dark
    Light

Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices.

The following parameters are required for Checkpoint Infinity:

  1. Host URL - The hostname of the Checkpoint Infinity server
  2. Username - The username of a read-only user
  3. Password - The password of a read-only user
  4. CheckPoint Domain - An optional domain to connect to, within the Checkpoint Infinity server
  5. Verify SSL - if selected, will verify the ssl certificate of the server
  6. HTTPS Proxy - an optional HTTPS proxy

image.png

Creating a read-only user for Checkpoint Infinity

Creating a read-only user varies between different versions of CheckPoint Infinity and instructions for doing so can be found in the Check Point user manual. As a general reference, The following guide can be used to create read-only administrators.

Was this article helpful?