Submit Search
Upload
Auditing Check Point Firewalls
•
Download as PPT, PDF
•
5 likes
•
5,762 views
Ben Rothke
Follow
One of the first presentations I gave. CSI 1999- Auditing Check Point Firewalls
Read less
Read more
Technology
Report
Share
Report
Share
1 of 38
Download now
Recommended
Firewall audit
Firewall audit
Velliyangiri K.S
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
Fortinet
Fortinet
Petre-doru Dragus
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
SHRIYARAI4
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
SIEM presentation final
SIEM presentation final
Rizwan S
Recommended
Firewall audit
Firewall audit
Velliyangiri K.S
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
Fortinet
Fortinet
Petre-doru Dragus
SIEM : Security Information and Event Management
SIEM : Security Information and Event Management
SHRIYARAI4
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
IPS (intrusion prevention system)
IPS (intrusion prevention system)
Netwax Lab
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
SIEM presentation final
SIEM presentation final
Rizwan S
Firewall
Firewall
Saurabh Chauhan
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
SIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
SIEM Primer:
SIEM Primer:
Anton Chuvakin
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
Cyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
Donald E. Hester
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
Fortinet
Fortinet
ABEP123
Fortigate Training
Fortigate Training
NCS Computech Ltd.
Network Operations Center (NOC)
Network Operations Center (NOC)
Boni Yeamin
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
SOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
cockekeshia
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
More Related Content
What's hot
Firewall
Firewall
Saurabh Chauhan
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
SIEM Architecture
SIEM Architecture
Nishanth Kumar Pathi
SIEM Primer:
SIEM Primer:
Anton Chuvakin
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
Cyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
Donald E. Hester
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
Fortinet
Fortinet
ABEP123
Fortigate Training
Fortigate Training
NCS Computech Ltd.
Network Operations Center (NOC)
Network Operations Center (NOC)
Boni Yeamin
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
Security operation center (SOC)
Security operation center (SOC)
Ahmed Ayman
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
SOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
What's hot
(20)
Firewall
Firewall
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
SIEM Architecture
SIEM Architecture
SIEM Primer:
SIEM Primer:
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Cyber Security Needs and Challenges
Cyber Security Needs and Challenges
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Rothke secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Fortinet
Fortinet
Fortigate Training
Fortigate Training
Network Operations Center (NOC)
Network Operations Center (NOC)
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
Intrusion prevention system(ips)
Intrusion prevention system(ips)
Security operation center (SOC)
Security operation center (SOC)
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
SOC Cyber Security
SOC Cyber Security
Similar to Auditing Check Point Firewalls
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
cockekeshia
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
griffinruthie22
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
keyuradmin
Firewall best-practices-firewall-analyzer
Firewall best-practices-firewall-analyzer
iDric Soluciones de TI y Seguridad Informática
HIPAA Safeguard Slides
HIPAA Safeguard Slides
projectwinner
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
write4
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
write4
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
write31
Audit Practice at CipherTechs
Audit Practice at CipherTechs
Mordecai Kraushar
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docx
todd331
Ch06 Policy
Ch06 Policy
phanleson
Firewall
Firewall
Nishant Pahad
Cisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
Ch10 Conducting Audits
Ch10 Conducting Audits
Information Technology
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
BluechipComputerSyst
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution
Schneider Electric India
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
Atlantic Security Conference
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
Similar to Auditing Check Point Firewalls
(20)
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
Firewall best-practices-firewall-analyzer
Firewall best-practices-firewall-analyzer
HIPAA Safeguard Slides
HIPAA Safeguard Slides
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
ANSWER QUESTIONS AND RESPOND TO BOTH Your CISO was very.docx
Audit Practice at CipherTechs
Audit Practice at CipherTechs
Scenario Overview Now that you’re super knowledgeable about se.docx
Scenario Overview Now that you’re super knowledgeable about se.docx
Ch06 Policy
Ch06 Policy
Firewall
Firewall
Cisco NGFW AMP
Cisco NGFW AMP
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Ch10 Conducting Audits
Ch10 Conducting Audits
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
A Complete Guide To Firewall How To Build A Secure Networking System.pptx
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
More from Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Ben Rothke
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
Ben Rothke
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Ben Rothke
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Ben Rothke
Securing your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Ben Rothke
Lessons from ligatt
Lessons from ligatt
Ben Rothke
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Ben Rothke
Rothke effective data destruction practices
Rothke effective data destruction practices
Ben Rothke
Rothke computer forensics show 2010
Rothke computer forensics show 2010
Ben Rothke
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Ben Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Ben Rothke
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
Ben Rothke
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Ben Rothke
More from Ben Rothke
(20)
Securing your presence at the perimeter
Securing your presence at the perimeter
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
Locking down server and workstation operating systems
Locking down server and workstation operating systems
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
Securing your presence at the perimeter
Securing your presence at the perimeter
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt
Lessons from ligatt
Interop 2011 las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
Rothke effective data destruction practices
Rothke effective data destruction practices
Rothke computer forensics show 2010
Rothke computer forensics show 2010
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
Recently uploaded
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
WSO2
Recently uploaded
(20)
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Auditing Check Point Firewalls
1.
Auditing Checkpoint Firewalls
CSI Annual Conference 1999 Session J7 Ben Rothke, CISSP Network Security Engineer eB Networks, Inc. Iselin, New Jersey [email_address]
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
Examples of poor
rules
27.
Implied pseudo rules
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
Thank You!! Ben
Rothke, CISSP, CCO Network Security Engineer eB Networks, Inc. [email_address] www.ebnetworks.com Iselin, New Jersey USA
Download now