Check Point SmartProvisioning

Maximizes operational efficiency, enables consistent policy management
- Automated device management reduces errors and improves security
- Reduced administrative overhead and rapid deployment of devices
- Scalable to manage thousands of devices across multiple, disparate networks
Centralizes visibility and management of company-wide security posture
- Configure and manage all Check Point security devices via a single console
- Centralized control over appliance deployment, maintenance and recovery
- Easy management via an intuitive Graphical User Interface (GUI)
Integrated into Check Point Software Blade Architecture
- Activate SmartProvisioning on any Check Point Security Management system
Centralized Device Configuration via Intuitive GUI
The SmartProvisioning Software Blade provides an intuitive and easy-to-use security management console to centrally manage device configurations such as operating system and network settings. Networking configurations include DNS, hosts, domain, routing and interface settings.
The SmartProvisioning Blade interface enables easy navigation between the system overview, profile configuration and device configuration panes. The System Overview pane provides a quick snapshot of device status, critical notifications and action status. The Profile pane is the interface for managing provisioning profiles, and the Device pane allows for the easy management of gateways and other device objects.

System Overview Panel
Profile-Based Management
With the Check Point SmartProvisioning Software Blade, administrators can more easily manage security provisioning of large scale deployments by defining profiles for common security policies and device settings. Each profile defines the gateway properties per profile object—which represents multiple, unlimited gateways with similar properties and policies—rather than per physical gateway. This allows for batch operations and reduced administrative overhead.
The SmartProvisioning Blade uses different types of profiles to manage and provision security gateways, including:
- Security profiles: A security profile defines a Check Point security policy and other security-based settings for a set of gateways, whether corporate or branch office gateways. Each security profile can hold the configuration of any number of actual gateways, enabling large scale policy management of branch sites and gateways that have similar properties. Examples of such sites can include worldwide retail chain stores, bank ATM machines or car manufacturer dealerships.
- SmartProvisioning profiles: In order to facilitate the security provisioning and management of a large number of similarly configured devices, common settings can be configured on an object called the provisioning profile. Each provisioned device is associated with a provisioning profile, and inherits all of the profile's settings. A provisioning profile can define specific settings for networking, device management and the operating system. Common device settings include DNS, time zones, domain names and routing data. SmartProvisioning profiles can be applied to UTM-1, Power-1, SecurePlatform or UTM-1 Edge appliances. There are specific provisioning profiles for the different appliance products; so for example, UTM-1 Edge appliances will have provisioning profiles unique and different from Power-1 appliances.
All managed devices fetch their assigned profiles from the centralized management server. If the fetched profile differs from the previous profile, the device is updated with the changes. This way, one profile is able to update potentially hundreds and thousands of devices, each acquiring the new common properties while maintaining its own local settings.
Centralized SmartProvisioning Wizard
A security provisioning wizard enables administrators to configure large scale deployments of devices by allowing them to quickly choose the devices to be configured, fetch current configuration settings and associate devices with profile.
Scheduled Actions
Integrated into Check Point Software Blade Architecture
Specifications
| Feature | Details |
|---|---|
| Intuitive Simple User Interface (UI) | Yes (including SmartProvisioning wizard) |
| Overview and Status View | View configuration summary, critical notifications and status |
| Configuration Wizard | Simplifies profile creation |
| Shared Configuration | Provisioning and security profiles |
| Granular Device Management | Routing, DNS, Domain, Interfaces, Date&Time (Edge), DHCP (Edge), Backups, VPN configuration, dynamic objects |
| Custom Command Line Interface (CLI) |
Supports scripting device configuration |
| Running Scripts and Predefined Operations | Execute scripts remotely from the GUI |
| Fetch Configuration | Yes (SecurePlatform only) |
| Temporary Disable Central Management | Maintenance mode for local device administration |
| Internet Protocol Versions | IPv6 and IPv4 |
- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite
Smart-1 Security Management Appliances

