Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
Which Check Point software blade monitors Check Point devices and provides a picture of network and security performance?
The Check Point software blade that monitors Check Point devices and provides a picture of network and security performance is known as the Monitoring blade. Threat Emulation is used to detect and prevent advanced threats, Logging and Status handle logs and alert statuses, and Application Control manages application access and usage.
Correct
Correct. https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Monitoring-Blade.htm