The Check Point firewall is a device that provides controlled connectivity between an internal network and an external network (internet) while providing protection for the internal network by blocking traffic that isn’t explicitly allowed.
Check Point devices can be configured to provide additional security functions as well. CimTrak for Network Devices monitors the device configuration for changes, logs the changes, and then notifies the responsible parties of them.
When CimTrak locks a Check Point device for monitoring, it reads the configuration of the device. It calculates a digital signature of the configuration, and stores it in CimTrak’s master repository along with a copy of the configuration. At user-configured intervals, CimTrak reads the contents of the configuration, calculates the digital signature, and compares it to the signature stored in CimTrak’s master repository.
When CimTrak detects a change in the configuration, its contents and its digital signature are then stored in the master repository. The master repository then logs the detected change and sends notifications to the configured emails and/or configured S
CimTrak detects any change to the Check Point device’s running configuration.