The Network Operations Center administrator needs access to Check Point Security devices mostly for troubleshooting purposes. You do not want to give her access to the expert mode, but she still should be able to run tcpdump. How can you achieve this requirement?
What are the three main components of Check Point security management architecture?
From the Gaia web interface, which of the following operations CANNOT be performed on a Security Management Server?
Which software blade enables Access Control policies to accept, drop, or limit web site access based on user, group, and/or machine?