Summary
In this chapter, we learned about the variety of environments in which administrators may be called to perform troubleshooting, and some of the questions you should have answered before engaging in this activity. We looked at different types of issues, some of the tools available for troubleshooting them, and sequences of actions that can lead to their successful resolution. We also covered the process of opening a Service Request with TAC and how to engage with support engineers to achieve better outcomes. You were introduced to the resources that are available in the CheckMates community toolbox and given some tips on productive interaction. Finally, we looked at postmortems and how to derive value from lessons learned during the troubleshooting process.
This was the last chapter of this book. I have attached a short Appendix on licensing with specifics for the lab environments.
Thank you for reading and welcome to the ranks of Check Point cyber defenders!