Sales Overview
17
SmartDashboard Tour
5. The Overview page presents critical information regarding the deployed
security infrastructure, including:
•
Objects representing machines in the organization
•
Top Security Gateways based on performance
•
Accepted and Dropped network traffic in real time
•
Security Policy overview (rules)
6. Check Point’s security solution is essentially broken down into objects and
rules. The objects represent all network elements, including:
•
Check Point Servers
•
Machines
•
Networks
•
Users
7. In the bottom left of the screen, click the icons to switch tabs and see if you
can identify the different types of objects in the database.