Check Point Infinity
Check Point Infinity is a cyber security architecture that prevents attacks across networks, cloud deployments, endpoints, mobile and IoT devices.
Configuring the Connector for Check Point Infinity
To configure Lucidum to ingest data from Check Point Infinity:
Log in to Lucidum.
In the left pane, click Connector.
In the Connector page, click Add Connector.
Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.
In the Settings page, enter the following:
URL (required): The URL of the Check Point Infinity API
Username and Password (required): Check Point Infinity username and password. Creating a read-only user varies between different versions of Check Point Infinity and instructions for doing so can be found in the Check Point user manual. As a general reference, you can use this the guide https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/162331https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/html_frameset.htm?topic=documents/R80.10/WebAdminGuides/EN/CP_R80.10_SecurityManagement_AdminGuide/162331 to create read-only administrators.
Verify SSL. For future use.
To test the configuration, click Test.
If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.
If the connector is not configured correctly, Lucidum displays an error message.