Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

SecureRemote configuration on NG

Posted on 2002-05-14
4
Medium Priority
?
237 Views
Last Modified: 2010-04-11
Hi guys,

Can somebody send me a link or pdf on how to create or setup SecuRemote rules on Checkpoint NG?

Thanks in advance. :-)

Neil
0
Comment
Question by:rcamara
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 100 total points
ID: 7020204
www.phoneboy.com ?
You have to setup these rules by users, rather than by network objects - fairly simple stuff.
0
 

Author Comment

by:rcamara
ID: 7020683
I got it. I found it from Desktop Security PDF file. It straight forward.

Thanks.
0
 
LVL 1

Expert Comment

by:Moondancer
ID: 7109079
Did you intend to award tim_holman for this?  It is open today.
Thanks,
Moondancer - EE Moderator
0
 
LVL 5

Expert Comment

by:zenlion420
ID: 9709171
Hey people,

No comment has been added in roughly 1 year, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question
be PAQ'd and pts be awarded to tim_holman.
Please leave any comments here within the next seven days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

Zenlion420
EE Page Editor
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Still wondering grappling over to strengthen your password, worry no more. Choose a Strong Passphrase instead though second factor is highly recommended. Read on more on the how-to and tips to enhance your "password" using easier to remember passphr…
Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question