Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw
published on Monday, Mar 30, 2026 by checkpointsw
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw
published on Monday, Mar 30, 2026 by checkpointsw
Use this data source to get information on an existing Check Point threat-rule-exception-rulebase
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as checkpoint from "@pulumi/checkpoint";
const base1 = checkpoint.getManagementThreatRuleExceptionRulebase({
name: "Standard Threat Prevention",
ruleNumber: "1",
});
import pulumi
import pulumi_checkpoint as checkpoint
base1 = checkpoint.get_management_threat_rule_exception_rulebase(name="Standard Threat Prevention",
rule_number="1")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v3/checkpoint"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := checkpoint.GetManagementThreatRuleExceptionRulebase(ctx, &checkpoint.GetManagementThreatRuleExceptionRulebaseArgs{
Name: pulumi.StringRef("Standard Threat Prevention"),
RuleNumber: pulumi.StringRef("1"),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Checkpoint = Pulumi.Checkpoint;
return await Deployment.RunAsync(() =>
{
var base1 = Checkpoint.GetManagementThreatRuleExceptionRulebase.Invoke(new()
{
Name = "Standard Threat Prevention",
RuleNumber = "1",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.checkpoint.CheckpointFunctions;
import com.pulumi.checkpoint.inputs.GetManagementThreatRuleExceptionRulebaseArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var base1 = CheckpointFunctions.getManagementThreatRuleExceptionRulebase(GetManagementThreatRuleExceptionRulebaseArgs.builder()
.name("Standard Threat Prevention")
.ruleNumber("1")
.build());
}
}
variables:
base1:
fn::invoke:
function: checkpoint:getManagementThreatRuleExceptionRulebase
arguments:
name: Standard Threat Prevention
ruleNumber: 1
Using getManagementThreatRuleExceptionRulebase
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getManagementThreatRuleExceptionRulebase(args: GetManagementThreatRuleExceptionRulebaseArgs, opts?: InvokeOptions): Promise<GetManagementThreatRuleExceptionRulebaseResult>
function getManagementThreatRuleExceptionRulebaseOutput(args: GetManagementThreatRuleExceptionRulebaseOutputArgs, opts?: InvokeOptions): Output<GetManagementThreatRuleExceptionRulebaseResult>def get_management_threat_rule_exception_rulebase(filter: Optional[str] = None,
filter_settings: Optional[Sequence[GetManagementThreatRuleExceptionRulebaseFilterSetting]] = None,
id: Optional[str] = None,
limit: Optional[float] = None,
name: Optional[str] = None,
offset: Optional[float] = None,
orders: Optional[Sequence[GetManagementThreatRuleExceptionRulebaseOrder]] = None,
package: Optional[str] = None,
rule_name: Optional[str] = None,
rule_number: Optional[str] = None,
rule_uid: Optional[str] = None,
uid: Optional[str] = None,
use_object_dictionary: Optional[bool] = None,
opts: Optional[InvokeOptions] = None) -> GetManagementThreatRuleExceptionRulebaseResult
def get_management_threat_rule_exception_rulebase_output(filter: Optional[pulumi.Input[str]] = None,
filter_settings: Optional[pulumi.Input[Sequence[pulumi.Input[GetManagementThreatRuleExceptionRulebaseFilterSettingArgs]]]] = None,
id: Optional[pulumi.Input[str]] = None,
limit: Optional[pulumi.Input[float]] = None,
name: Optional[pulumi.Input[str]] = None,
offset: Optional[pulumi.Input[float]] = None,
orders: Optional[pulumi.Input[Sequence[pulumi.Input[GetManagementThreatRuleExceptionRulebaseOrderArgs]]]] = None,
package: Optional[pulumi.Input[str]] = None,
rule_name: Optional[pulumi.Input[str]] = None,
rule_number: Optional[pulumi.Input[str]] = None,
rule_uid: Optional[pulumi.Input[str]] = None,
uid: Optional[pulumi.Input[str]] = None,
use_object_dictionary: Optional[pulumi.Input[bool]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetManagementThreatRuleExceptionRulebaseResult]func GetManagementThreatRuleExceptionRulebase(ctx *Context, args *GetManagementThreatRuleExceptionRulebaseArgs, opts ...InvokeOption) (*GetManagementThreatRuleExceptionRulebaseResult, error)
func GetManagementThreatRuleExceptionRulebaseOutput(ctx *Context, args *GetManagementThreatRuleExceptionRulebaseOutputArgs, opts ...InvokeOption) GetManagementThreatRuleExceptionRulebaseResultOutput> Note: This function is named GetManagementThreatRuleExceptionRulebase in the Go SDK.
public static class GetManagementThreatRuleExceptionRulebase
{
public static Task<GetManagementThreatRuleExceptionRulebaseResult> InvokeAsync(GetManagementThreatRuleExceptionRulebaseArgs args, InvokeOptions? opts = null)
public static Output<GetManagementThreatRuleExceptionRulebaseResult> Invoke(GetManagementThreatRuleExceptionRulebaseInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetManagementThreatRuleExceptionRulebaseResult> getManagementThreatRuleExceptionRulebase(GetManagementThreatRuleExceptionRulebaseArgs args, InvokeOptions options)
public static Output<GetManagementThreatRuleExceptionRulebaseResult> getManagementThreatRuleExceptionRulebase(GetManagementThreatRuleExceptionRulebaseArgs args, InvokeOptions options)
fn::invoke:
function: checkpoint:index/getManagementThreatRuleExceptionRulebase:getManagementThreatRuleExceptionRulebase
arguments:
# arguments dictionaryThe following arguments are supported:
- Filter string
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- Filter
Settings List<GetManagement Threat Rule Exception Rulebase Filter Setting> - Enable enforce end user domain. filter_settings blocks are documented below.
- Id string
- Limit double
- The maximal number of returned results.
- Name string
- The name of the exception.
- Offset double
- Number of the results to initially skip.
- Orders
List<Get
Management Threat Rule Exception Rulebase Order> - Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- Package string
- Name of the package.
- Rule
Name string - Rule
Number string - Rule
Uid string - Uid string
- Object unique identifier.
- Use
Object boolDictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
- Filter string
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- Filter
Settings []GetManagement Threat Rule Exception Rulebase Filter Setting - Enable enforce end user domain. filter_settings blocks are documented below.
- Id string
- Limit float64
- The maximal number of returned results.
- Name string
- The name of the exception.
- Offset float64
- Number of the results to initially skip.
- Orders
[]Get
Management Threat Rule Exception Rulebase Order - Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- Package string
- Name of the package.
- Rule
Name string - Rule
Number string - Rule
Uid string - Uid string
- Object unique identifier.
- Use
Object boolDictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
- filter String
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- filter
Settings List<GetManagement Threat Rule Exception Rulebase Filter Setting> - Enable enforce end user domain. filter_settings blocks are documented below.
- id String
- limit Double
- The maximal number of returned results.
- name String
- The name of the exception.
- offset Double
- Number of the results to initially skip.
- orders
List<Get
Management Threat Rule Exception Rulebase Order> - Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- package_ String
- Name of the package.
- rule
Name String - rule
Number String - rule
Uid String - uid String
- Object unique identifier.
- use
Object BooleanDictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
- filter string
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- filter
Settings GetManagement Threat Rule Exception Rulebase Filter Setting[] - Enable enforce end user domain. filter_settings blocks are documented below.
- id string
- limit number
- The maximal number of returned results.
- name string
- The name of the exception.
- offset number
- Number of the results to initially skip.
- orders
Get
Management Threat Rule Exception Rulebase Order[] - Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- package string
- Name of the package.
- rule
Name string - rule
Number string - rule
Uid string - uid string
- Object unique identifier.
- use
Object booleanDictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
- filter str
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- filter_
settings Sequence[GetManagement Threat Rule Exception Rulebase Filter Setting] - Enable enforce end user domain. filter_settings blocks are documented below.
- id str
- limit float
- The maximal number of returned results.
- name str
- The name of the exception.
- offset float
- Number of the results to initially skip.
- orders
Sequence[Get
Management Threat Rule Exception Rulebase Order] - Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- package str
- Name of the package.
- rule_
name str - rule_
number str - rule_
uid str - uid str
- Object unique identifier.
- use_
object_ booldictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
- filter String
- Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.
- filter
Settings List<Property Map> - Enable enforce end user domain. filter_settings blocks are documented below.
- id String
- limit Number
- The maximal number of returned results.
- name String
- The name of the exception.
- offset Number
- Number of the results to initially skip.
- orders List<Property Map>
- Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.
- package String
- Name of the package.
- rule
Name String - rule
Number String - rule
Uid String - uid String
- Object unique identifier.
- use
Object BooleanDictionary - boolean flag. indicate whether to use object dictionary in the response (default true).
getManagementThreatRuleExceptionRulebase Result
The following output properties are available:
- From double
- Id string
- Objects
Dictionaries List<GetManagement Threat Rule Exception Rulebase Objects Dictionary> - Rulebases
List<Get
Management Threat Rule Exception Rulebase Rulebase> - To double
- Total double
- Filter string
- Filter
Settings List<GetManagement Threat Rule Exception Rulebase Filter Setting> - Limit double
- Name string
- Offset double
- Orders
List<Get
Management Threat Rule Exception Rulebase Order> - Package string
- Rule
Name string - Rule
Number string - Rule
Uid string - Uid string
- Use
Object boolDictionary
- From float64
- Id string
- Objects
Dictionaries []GetManagement Threat Rule Exception Rulebase Objects Dictionary - Rulebases
[]Get
Management Threat Rule Exception Rulebase Rulebase - To float64
- Total float64
- Filter string
- Filter
Settings []GetManagement Threat Rule Exception Rulebase Filter Setting - Limit float64
- Name string
- Offset float64
- Orders
[]Get
Management Threat Rule Exception Rulebase Order - Package string
- Rule
Name string - Rule
Number string - Rule
Uid string - Uid string
- Use
Object boolDictionary
- from Double
- id String
- objects
Dictionaries List<GetManagement Threat Rule Exception Rulebase Objects Dictionary> - rulebases
List<Get
Management Threat Rule Exception Rulebase Rulebase> - to Double
- total Double
- filter String
- filter
Settings List<GetManagement Threat Rule Exception Rulebase Filter Setting> - limit Double
- name String
- offset Double
- orders
List<Get
Management Threat Rule Exception Rulebase Order> - package_ String
- rule
Name String - rule
Number String - rule
Uid String - uid String
- use
Object BooleanDictionary
- from number
- id string
- objects
Dictionaries GetManagement Threat Rule Exception Rulebase Objects Dictionary[] - rulebases
Get
Management Threat Rule Exception Rulebase Rulebase[] - to number
- total number
- filter string
- filter
Settings GetManagement Threat Rule Exception Rulebase Filter Setting[] - limit number
- name string
- offset number
- orders
Get
Management Threat Rule Exception Rulebase Order[] - package string
- rule
Name string - rule
Number string - rule
Uid string - uid string
- use
Object booleanDictionary
- from_ float
- id str
- objects_
dictionaries Sequence[GetManagement Threat Rule Exception Rulebase Objects Dictionary] - rulebases
Sequence[Get
Management Threat Rule Exception Rulebase Rulebase] - to float
- total float
- filter str
- filter_
settings Sequence[GetManagement Threat Rule Exception Rulebase Filter Setting] - limit float
- name str
- offset float
- orders
Sequence[Get
Management Threat Rule Exception Rulebase Order] - package str
- rule_
name str - rule_
number str - rule_
uid str - uid str
- use_
object_ booldictionary
- from Number
- id String
- objects
Dictionaries List<Property Map> - rulebases List<Property Map>
- to Number
- total Number
- filter String
- filter
Settings List<Property Map> - limit Number
- name String
- offset Number
- orders List<Property Map>
- package String
- rule
Name String - rule
Number String - rule
Uid String - uid String
- use
Object BooleanDictionary
Supporting Types
GetManagementThreatRuleExceptionRulebaseFilterSetting
- Packet
Search List<GetSettings Management Threat Rule Exception Rulebase Filter Setting Packet Search Setting> - packet search settings
- Search
Mode string - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
- Packet
Search []GetSettings Management Threat Rule Exception Rulebase Filter Setting Packet Search Setting - packet search settings
- Search
Mode string - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
- packet
Search List<GetSettings Management Threat Rule Exception Rulebase Filter Setting Packet Search Setting> - packet search settings
- search
Mode String - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
- packet
Search GetSettings Management Threat Rule Exception Rulebase Filter Setting Packet Search Setting[] - packet search settings
- search
Mode string - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
- packet_
search_ Sequence[Getsettings Management Threat Rule Exception Rulebase Filter Setting Packet Search Setting] - packet search settings
- search_
mode str - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
- packet
Search List<Property Map>Settings - packet search settings
- search
Mode String - When set to 'general', both the Full Text Search and Packet Search are enabled. In this mode, Packet Search will not match on 'Any' object, a negated cell or a group-with-exclusion. When the search-mode is set to 'packet', by default, the match on 'Any' object, a negated cell or a group-with-exclusion are enabled. packet-search-settings may be provided to change the default behavior.
GetManagementThreatRuleExceptionRulebaseFilterSettingPacketSearchSetting
- Expand
Group boolMembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- Expand
Group boolWith Exclusion Members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- Match
On boolAny - Whether to match on 'Any' object
- Match
On boolGroup With Exclusion - Whether to match on a group-with-exclusion.
- Match
On boolNegate - Whether to match on a negated cell.
- Expand
Group boolMembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- Expand
Group boolWith Exclusion Members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- Match
On boolAny - Whether to match on 'Any' object
- Match
On boolGroup With Exclusion - Whether to match on a group-with-exclusion.
- Match
On boolNegate - Whether to match on a negated cell.
- expand
Group BooleanMembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- expand
Group BooleanWith Exclusion Members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- match
On BooleanAny - Whether to match on 'Any' object
- match
On BooleanGroup With Exclusion - Whether to match on a group-with-exclusion.
- match
On BooleanNegate - Whether to match on a negated cell.
- expand
Group booleanMembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- expand
Group booleanWith Exclusion Members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- match
On booleanAny - Whether to match on 'Any' object
- match
On booleanGroup With Exclusion - Whether to match on a group-with-exclusion.
- match
On booleanNegate - Whether to match on a negated cell.
- expand_
group_ boolmembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- expand_
group_ boolwith_ exclusion_ members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- match_
on_ boolany - Whether to match on 'Any' object
- match_
on_ boolgroup_ with_ exclusion - Whether to match on a group-with-exclusion.
- match_
on_ boolnegate - Whether to match on a negated cell.
- expand
Group BooleanMembers - When true, if the search expression contains a UID or a name of a group object, results will include rules that match on at least one member of the group.
- expand
Group BooleanWith Exclusion Members - When true, if the search expression contains a UID or a name of a group-with-exclusion object, results will include rules that match at least one member of the "include" part and is not a member of the "except" part.
- match
On BooleanAny - Whether to match on 'Any' object
- match
On BooleanGroup With Exclusion - Whether to match on a group-with-exclusion.
- match
On BooleanNegate - Whether to match on a negated cell.
GetManagementThreatRuleExceptionRulebaseObjectsDictionary
GetManagementThreatRuleExceptionRulebaseOrder
GetManagementThreatRuleExceptionRulebaseRulebase
- From double
- From which element number the query was done.
- Name string
- The name of the exception group.
- Rulebases
List<Get
Management Threat Rule Exception Rulebase Rulebase Rulebase> - Array that contain threat exception for a specific exception group.
- To double
- To which element number the query was done.
- Type string
- Object type.
- Uid string
- Object unique identifier.
- From float64
- From which element number the query was done.
- Name string
- The name of the exception group.
- Rulebases
[]Get
Management Threat Rule Exception Rulebase Rulebase Rulebase - Array that contain threat exception for a specific exception group.
- To float64
- To which element number the query was done.
- Type string
- Object type.
- Uid string
- Object unique identifier.
- from Double
- From which element number the query was done.
- name String
- The name of the exception group.
- rulebases
List<Get
Management Threat Rule Exception Rulebase Rulebase Rulebase> - Array that contain threat exception for a specific exception group.
- to Double
- To which element number the query was done.
- type String
- Object type.
- uid String
- Object unique identifier.
- from number
- From which element number the query was done.
- name string
- The name of the exception group.
- rulebases
Get
Management Threat Rule Exception Rulebase Rulebase Rulebase[] - Array that contain threat exception for a specific exception group.
- to number
- To which element number the query was done.
- type string
- Object type.
- uid string
- Object unique identifier.
- from_ float
- From which element number the query was done.
- name str
- The name of the exception group.
- rulebases
Sequence[Get
Management Threat Rule Exception Rulebase Rulebase Rulebase] - Array that contain threat exception for a specific exception group.
- to float
- To which element number the query was done.
- type str
- Object type.
- uid str
- Object unique identifier.
- from Number
- From which element number the query was done.
- name String
- The name of the exception group.
- rulebases List<Property Map>
- Array that contain threat exception for a specific exception group.
- to Number
- To which element number the query was done.
- type String
- Object type.
- uid String
- Object unique identifier.
GetManagementThreatRuleExceptionRulebaseRulebaseRulebase
- Action string
- Action-the enforced profile.
- Destination
Negate bool - True if negate is set for destination.
- Destinations List<string>
- Collection of Network objects identified by the name or UID.
- Exception
Number string - Install
Ons List<string> - Which Gateways identified by the name or UID to install the policy on.
- Name string
- The name of the exception group.
- Protected
Scope boolNegate - True if negate is set for Protected Scope.
- Protected
Scopes List<string> - Collection of objects defining Protected Scope identified by the name or UID.
- Protection
Or List<string>Sites - Service
Negate bool - True if negate is set for service.
- Services List<string>
- Collection of Network objects identified by the name or UID.
- Source
Negate bool - True if negate is set for source.
- Sources List<string>
- Collection of Network objects identified by the name or UID.
- Track string
- Packet tracking.
- Type string
- Object type.
- Uid string
- Object unique identifier.
- Action string
- Action-the enforced profile.
- Destination
Negate bool - True if negate is set for destination.
- Destinations []string
- Collection of Network objects identified by the name or UID.
- Exception
Number string - Install
Ons []string - Which Gateways identified by the name or UID to install the policy on.
- Name string
- The name of the exception group.
- Protected
Scope boolNegate - True if negate is set for Protected Scope.
- Protected
Scopes []string - Collection of objects defining Protected Scope identified by the name or UID.
- Protection
Or []stringSites - Service
Negate bool - True if negate is set for service.
- Services []string
- Collection of Network objects identified by the name or UID.
- Source
Negate bool - True if negate is set for source.
- Sources []string
- Collection of Network objects identified by the name or UID.
- Track string
- Packet tracking.
- Type string
- Object type.
- Uid string
- Object unique identifier.
- action String
- Action-the enforced profile.
- destination
Negate Boolean - True if negate is set for destination.
- destinations List<String>
- Collection of Network objects identified by the name or UID.
- exception
Number String - install
Ons List<String> - Which Gateways identified by the name or UID to install the policy on.
- name String
- The name of the exception group.
- protected
Scope BooleanNegate - True if negate is set for Protected Scope.
- protected
Scopes List<String> - Collection of objects defining Protected Scope identified by the name or UID.
- protection
Or List<String>Sites - service
Negate Boolean - True if negate is set for service.
- services List<String>
- Collection of Network objects identified by the name or UID.
- source
Negate Boolean - True if negate is set for source.
- sources List<String>
- Collection of Network objects identified by the name or UID.
- track String
- Packet tracking.
- type String
- Object type.
- uid String
- Object unique identifier.
- action string
- Action-the enforced profile.
- destination
Negate boolean - True if negate is set for destination.
- destinations string[]
- Collection of Network objects identified by the name or UID.
- exception
Number string - install
Ons string[] - Which Gateways identified by the name or UID to install the policy on.
- name string
- The name of the exception group.
- protected
Scope booleanNegate - True if negate is set for Protected Scope.
- protected
Scopes string[] - Collection of objects defining Protected Scope identified by the name or UID.
- protection
Or string[]Sites - service
Negate boolean - True if negate is set for service.
- services string[]
- Collection of Network objects identified by the name or UID.
- source
Negate boolean - True if negate is set for source.
- sources string[]
- Collection of Network objects identified by the name or UID.
- track string
- Packet tracking.
- type string
- Object type.
- uid string
- Object unique identifier.
- action str
- Action-the enforced profile.
- destination_
negate bool - True if negate is set for destination.
- destinations Sequence[str]
- Collection of Network objects identified by the name or UID.
- exception_
number str - install_
ons Sequence[str] - Which Gateways identified by the name or UID to install the policy on.
- name str
- The name of the exception group.
- protected_
scope_ boolnegate - True if negate is set for Protected Scope.
- protected_
scopes Sequence[str] - Collection of objects defining Protected Scope identified by the name or UID.
- protection_
or_ Sequence[str]sites - service_
negate bool - True if negate is set for service.
- services Sequence[str]
- Collection of Network objects identified by the name or UID.
- source_
negate bool - True if negate is set for source.
- sources Sequence[str]
- Collection of Network objects identified by the name or UID.
- track str
- Packet tracking.
- type str
- Object type.
- uid str
- Object unique identifier.
- action String
- Action-the enforced profile.
- destination
Negate Boolean - True if negate is set for destination.
- destinations List<String>
- Collection of Network objects identified by the name or UID.
- exception
Number String - install
Ons List<String> - Which Gateways identified by the name or UID to install the policy on.
- name String
- The name of the exception group.
- protected
Scope BooleanNegate - True if negate is set for Protected Scope.
- protected
Scopes List<String> - Collection of objects defining Protected Scope identified by the name or UID.
- protection
Or List<String>Sites - service
Negate Boolean - True if negate is set for service.
- services List<String>
- Collection of Network objects identified by the name or UID.
- source
Negate Boolean - True if negate is set for source.
- sources List<String>
- Collection of Network objects identified by the name or UID.
- track String
- Packet tracking.
- type String
- Object type.
- uid String
- Object unique identifier.
Package Details
- Repository
- checkpoint checkpointsw/terraform-provider-checkpoint
- License
- Notes
- This Pulumi package is based on the
checkpointTerraform Provider.
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw
published on Monday, Mar 30, 2026 by checkpointsw
