v2.3 [Aug 27, 2014]
- Integrated Check Point devices into Nipper Studio’s remote audit functionality. Now auditors will be able to use the tool to remotely retrieve files from Check Point devices. This includes the Check Point management systems, thus allowing the auditing of multiple devices simultaneously.
- Check Point software can run on a variety of different operating systems and platforms, but extracting the configuration file is a time-consuming process that many auditors often struggle with. The configuration retriever is designed to simplify the process and reduce support time for penetration testers.
- Added the “Exclude Vulnerabilities” functionality, which allows users to specify vulnerabilities that may be erroneously flagged due to the system they operate. The “Exclude Security Issues” functionality was already available for security auditing, in order to exempt specific issues for bespoke network setups.
Sunbelt Personal Firewall protects your PC from intrusions monitoring traffic.