Creating Host Objects with R80 Management API Tutorial | Security Management Tutorial

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=JUU7_r15_pw



Category:
Tutorial
Duration: 7:14
19,687 views
104


How to use R80 Management API to run a BASH script that automatically creates host objects in the Security Management server database. For more information: http://supportcontent.checkpoint.com/solutions?id=sk108623

This video tutorial is intended for users that are familiar with automation scripts.

Product: Anti-Bot, Anti-Spam, Anti-Virus, Application Control, DLP, Document Security, HTTPS Inspection, IPS, Identity Awareness, Multi-Domain Management / Provider-1, QoS / Floodgate-1, SSL Network Extender, Security Management, SmartConsole / SmartDashboard, SmartDomain Manager, SmartEvent / Eventia Analyzer, SmartUpdate, SmartView Monitor, Threat Emulation, URL Filtering




Other Videos By Check Point Software


2017-02-21SandBlast Agent Forensics
2017-02-06Anatomy of a Smishing Attack: Czech Posta App
2017-02-02Protecting Mobile Devices Together - ElevenPaths – Telefonica and Check Point | Mobile Security
2017-01-30Cyber Security Demo for Industrial Control Systems
2017-01-23Hamas’ Cyber Tactics Exposed - Attacking IDF Soldier’s Mobile Phones
2017-01-18vSEC for your AWS Workloads
2017-01-16Secure Your AWS Apps and Data | Cloud Security
2017-01-13Koch Media Crushes Advanced Attacks with SandBlast | Advanced Threat Prevention
2017-01-03Daymark Secures Cloud with CloudGuard (formerly vSEC) for Microsoft Azure | Cloud Security
2016-11-28モバイルデバイスを狙う中間者攻撃
2016-11-22Creating Host Objects with R80 Management API Tutorial | Security Management Tutorial
2016-11-22R80 Streamlines Security Management at Appvion | Data Center Security
2016-11-22R80 Enhances Efficiency at the University of Kansas
2016-11-20Tutorial: Configuring Application Control
2016-10-31From HummingBad to Worse: Android Malware Campaign | SandBlast Mobile Security
2016-10-26Tutorial: Configuring IPS Settings with R80 Security Management Server | Advanced Threat Prevention
2016-10-14Recomendaciones para una navegaciÌ_n segura en Internet CNN Chile
2016-10-14Juan Rivera, habla sobre seguridad en redes sociales
2016-10-14Guerra cibernÌ©tica, nuestro paÌ_s es vulnerable a ataques en la red
2016-10-14Jorge Steinfeld, Check Point Software; Entrevista en RPP TV
2016-10-14Entrevista a Francisco Robayo, sobre los delitos en la red Teleamazonas Ecuador



Tags:
R80
management
security management
api
mgmt_cli tool
check point software
support
configuration
enterprise security management
security management software
best security management
r80
r80.10
r77
r77.30
infinity
check point infinity
data center security
security
threat emulation
anti-bot
anti-spam
anti-virus
HTTPS inspection
SmartConsole
Application Control
Identity Awareness
Document-Security
DLP
network extender