Check Point Infinity
  • 1 Minute To Read
  • Print
  • Share
  • Dark
    Light

Check Point Infinity

  • Print
  • Share
  • Dark
    Light

Check Point Infinity protects against cyber threats across networks, endpoint, cloud and mobile devices. This adapter supports the entire Infinity platform, including Check Point firewalls.

The following parameters are required for Check Point Infinity:

  1. Host URL - The hostname of the Check Point Infinity server
  2. Username - The username of a read-only user
  3. Password - The password of a read-only user
  4. Check Point Domain - An optional domain to connect to, within the Check Point Infinity server
  5. Verify SSL - if selected, will verify the ssl certificate of the server
  6. HTTPS Proxy - an optional HTTPS proxy

image.png

Creating a read-only user for Check Point Infinity

Creating a read-only user varies between different versions of Check Point Infinity and instructions for doing so can be found in the Check Point user manual. As a general reference, The following guide can be used to create read-only administrators.

Was This Article Helpful?