This workflow template automates the integration and security policy deployment for the Check Point Management Server. It ensures seamless host management, where it checks host existence and creates new hosts if needed. Subsequent steps include publishing the changes and installing policies on the gateway, with checks to ensure each task is completed before progressing. The workflow culminates by logging out of the management session, enforcing security best practices and maintaining a streamlined network security posture.
Use Cases
Remediate Network Security Alerts
Workflow Breakdown
Get a session id from the Check Point management server
Loop over hosts and if the host does not exist, create it
Publish changes to the management server
Install policy to the gateway
Logout of the session
Vendors
Utils, Check Point Management
Workflow Output
Add new hosts on a Check Point Management server and install policy