1. Packages
  2. Packages
  3. Checkpoint Provider
  4. API Docs
  5. ManagementDomainPermissionsProfile
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw
Viewing docs for checkpoint 3.0.0
published on Monday, Mar 30, 2026 by checkpointsw

    This resource allows you to execute Check Point Domain Permissions Profile.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as checkpoint from "@pulumi/checkpoint";
    
    const example = new checkpoint.ManagementDomainPermissionsProfile("example", {name: "customize profile"});
    
    import pulumi
    import pulumi_checkpoint as checkpoint
    
    example = checkpoint.ManagementDomainPermissionsProfile("example", name="customize profile")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v3/checkpoint"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "example", &checkpoint.ManagementDomainPermissionsProfileArgs{
    			Name: pulumi.String("customize profile"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Checkpoint = Pulumi.Checkpoint;
    
    return await Deployment.RunAsync(() => 
    {
        var example = new Checkpoint.ManagementDomainPermissionsProfile("example", new()
        {
            Name = "customize profile",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.checkpoint.ManagementDomainPermissionsProfile;
    import com.pulumi.checkpoint.ManagementDomainPermissionsProfileArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var example = new ManagementDomainPermissionsProfile("example", ManagementDomainPermissionsProfileArgs.builder()
                .name("customize profile")
                .build());
    
        }
    }
    
    resources:
      example:
        type: checkpoint:ManagementDomainPermissionsProfile
        properties:
          name: customize profile
    

    Create ManagementDomainPermissionsProfile Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new ManagementDomainPermissionsProfile(name: string, args?: ManagementDomainPermissionsProfileArgs, opts?: CustomResourceOptions);
    @overload
    def ManagementDomainPermissionsProfile(resource_name: str,
                                           args: Optional[ManagementDomainPermissionsProfileArgs] = None,
                                           opts: Optional[ResourceOptions] = None)
    
    @overload
    def ManagementDomainPermissionsProfile(resource_name: str,
                                           opts: Optional[ResourceOptions] = None,
                                           access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
                                           color: Optional[str] = None,
                                           comments: Optional[str] = None,
                                           edit_common_objects: Optional[bool] = None,
                                           endpoint: Optional[ManagementDomainPermissionsProfileEndpointArgs] = None,
                                           events_and_reports: Optional[ManagementDomainPermissionsProfileEventsAndReportsArgs] = None,
                                           gateways: Optional[ManagementDomainPermissionsProfileGatewaysArgs] = None,
                                           ignore_errors: Optional[bool] = None,
                                           ignore_warnings: Optional[bool] = None,
                                           management: Optional[ManagementDomainPermissionsProfileManagementArgs] = None,
                                           management_domain_permissions_profile_id: Optional[str] = None,
                                           monitoring_and_logging: Optional[ManagementDomainPermissionsProfileMonitoringAndLoggingArgs] = None,
                                           name: Optional[str] = None,
                                           others: Optional[ManagementDomainPermissionsProfileOthersArgs] = None,
                                           permission_type: Optional[str] = None,
                                           tags: Optional[Sequence[str]] = None,
                                           threat_prevention: Optional[ManagementDomainPermissionsProfileThreatPreventionArgs] = None)
    func NewManagementDomainPermissionsProfile(ctx *Context, name string, args *ManagementDomainPermissionsProfileArgs, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
    public ManagementDomainPermissionsProfile(string name, ManagementDomainPermissionsProfileArgs? args = null, CustomResourceOptions? opts = null)
    public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args)
    public ManagementDomainPermissionsProfile(String name, ManagementDomainPermissionsProfileArgs args, CustomResourceOptions options)
    
    type: checkpoint:ManagementDomainPermissionsProfile
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args ManagementDomainPermissionsProfileArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var managementDomainPermissionsProfileResource = new Checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", new()
    {
        AccessControl = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlArgs
        {
            AccessControlObjectsAndSettings = "string",
            AppControlAndUrlFilteringUpdate = false,
            DlpPolicy = "string",
            GeoControlPolicy = "string",
            InstallPolicy = false,
            NatPolicy = "string",
            PolicyLayers = new Checkpoint.Inputs.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs
            {
                AppControlAndUrlFiltering = false,
                ContentAwareness = false,
                EditLayers = "string",
                Firewall = false,
                MobileAccess = false,
            },
            QosPolicy = "string",
            ShowPolicy = false,
        },
        Color = "string",
        Comments = "string",
        EditCommonObjects = false,
        Endpoint = new Checkpoint.Inputs.ManagementDomainPermissionsProfileEndpointArgs
        {
            AllowExecutingPushOperations = false,
            AuthorizePrebootUsers = false,
            EditEndpointPolicies = false,
            EditSoftwareDeployment = false,
            ManagePoliciesAndSoftwareDeployment = false,
            PoliciesInstallation = false,
            RecoveryMedia = false,
            RemoteHelp = false,
            ResetComputerData = false,
            SoftwareDeploymentInstallation = false,
        },
        EventsAndReports = new Checkpoint.Inputs.ManagementDomainPermissionsProfileEventsAndReportsArgs
        {
            Events = "string",
            Policy = "string",
            Reports = false,
            SmartEvent = "string",
        },
        Gateways = new Checkpoint.Inputs.ManagementDomainPermissionsProfileGatewaysArgs
        {
            LsmGwDb = "string",
            ManageProvisioningProfiles = "string",
            ManageRepositoryScripts = "string",
            OpenShell = false,
            RunOneTimeScript = false,
            RunRepositoryScript = false,
            SmartUpdate = "string",
            SystemBackup = false,
            SystemRestore = false,
            VsxProvisioning = false,
        },
        IgnoreErrors = false,
        IgnoreWarnings = false,
        Management = new Checkpoint.Inputs.ManagementDomainPermissionsProfileManagementArgs
        {
            ApproveOrRejectSessions = false,
            CmeOperations = "string",
            HighAvailabilityOperations = false,
            ManageAdmins = false,
            ManageIntegrationWithCloudServices = false,
            ManageSessions = false,
            ManagementApiLogin = false,
            PublishSessions = false,
        },
        ManagementDomainPermissionsProfileId = "string",
        MonitoringAndLogging = new Checkpoint.Inputs.ManagementDomainPermissionsProfileMonitoringAndLoggingArgs
        {
            AppAndUrlFilteringLogs = false,
            DlpLogsIncludingConfidentialFields = false,
            HttpsInspectionLogs = false,
            Identities = false,
            ManageDlpMessages = false,
            ManagementLogs = "string",
            Monitoring = "string",
            PacketCaptureAndForensics = false,
            ShowIdentitiesByDefault = false,
            ShowPacketCaptureByDefault = false,
            TrackLogs = "string",
        },
        Name = "string",
        Others = new Checkpoint.Inputs.ManagementDomainPermissionsProfileOthersArgs
        {
            ClientCertificates = false,
            EditCpUsersDb = false,
            HttpsInspection = "string",
            LdapUsersDb = "string",
            UserAuthorityAccess = "string",
            UserDeviceMgmtConf = "string",
        },
        PermissionType = "string",
        Tags = new[]
        {
            "string",
        },
        ThreatPrevention = new Checkpoint.Inputs.ManagementDomainPermissionsProfileThreatPreventionArgs
        {
            EditLayers = "string",
            EditSettings = false,
            InstallPolicy = false,
            IpsUpdate = false,
            PolicyExceptions = "string",
            PolicyLayers = "string",
            Profiles = "string",
            Protections = "string",
        },
    });
    
    example, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, "managementDomainPermissionsProfileResource", &checkpoint.ManagementDomainPermissionsProfileArgs{
    	AccessControl: &checkpoint.ManagementDomainPermissionsProfileAccessControlArgs{
    		AccessControlObjectsAndSettings: pulumi.String("string"),
    		AppControlAndUrlFilteringUpdate: pulumi.Bool(false),
    		DlpPolicy:                       pulumi.String("string"),
    		GeoControlPolicy:                pulumi.String("string"),
    		InstallPolicy:                   pulumi.Bool(false),
    		NatPolicy:                       pulumi.String("string"),
    		PolicyLayers: &checkpoint.ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs{
    			AppControlAndUrlFiltering: pulumi.Bool(false),
    			ContentAwareness:          pulumi.Bool(false),
    			EditLayers:                pulumi.String("string"),
    			Firewall:                  pulumi.Bool(false),
    			MobileAccess:              pulumi.Bool(false),
    		},
    		QosPolicy:  pulumi.String("string"),
    		ShowPolicy: pulumi.Bool(false),
    	},
    	Color:             pulumi.String("string"),
    	Comments:          pulumi.String("string"),
    	EditCommonObjects: pulumi.Bool(false),
    	Endpoint: &checkpoint.ManagementDomainPermissionsProfileEndpointArgs{
    		AllowExecutingPushOperations:        pulumi.Bool(false),
    		AuthorizePrebootUsers:               pulumi.Bool(false),
    		EditEndpointPolicies:                pulumi.Bool(false),
    		EditSoftwareDeployment:              pulumi.Bool(false),
    		ManagePoliciesAndSoftwareDeployment: pulumi.Bool(false),
    		PoliciesInstallation:                pulumi.Bool(false),
    		RecoveryMedia:                       pulumi.Bool(false),
    		RemoteHelp:                          pulumi.Bool(false),
    		ResetComputerData:                   pulumi.Bool(false),
    		SoftwareDeploymentInstallation:      pulumi.Bool(false),
    	},
    	EventsAndReports: &checkpoint.ManagementDomainPermissionsProfileEventsAndReportsArgs{
    		Events:     pulumi.String("string"),
    		Policy:     pulumi.String("string"),
    		Reports:    pulumi.Bool(false),
    		SmartEvent: pulumi.String("string"),
    	},
    	Gateways: &checkpoint.ManagementDomainPermissionsProfileGatewaysArgs{
    		LsmGwDb:                    pulumi.String("string"),
    		ManageProvisioningProfiles: pulumi.String("string"),
    		ManageRepositoryScripts:    pulumi.String("string"),
    		OpenShell:                  pulumi.Bool(false),
    		RunOneTimeScript:           pulumi.Bool(false),
    		RunRepositoryScript:        pulumi.Bool(false),
    		SmartUpdate:                pulumi.String("string"),
    		SystemBackup:               pulumi.Bool(false),
    		SystemRestore:              pulumi.Bool(false),
    		VsxProvisioning:            pulumi.Bool(false),
    	},
    	IgnoreErrors:   pulumi.Bool(false),
    	IgnoreWarnings: pulumi.Bool(false),
    	Management: &checkpoint.ManagementDomainPermissionsProfileManagementArgs{
    		ApproveOrRejectSessions:            pulumi.Bool(false),
    		CmeOperations:                      pulumi.String("string"),
    		HighAvailabilityOperations:         pulumi.Bool(false),
    		ManageAdmins:                       pulumi.Bool(false),
    		ManageIntegrationWithCloudServices: pulumi.Bool(false),
    		ManageSessions:                     pulumi.Bool(false),
    		ManagementApiLogin:                 pulumi.Bool(false),
    		PublishSessions:                    pulumi.Bool(false),
    	},
    	ManagementDomainPermissionsProfileId: pulumi.String("string"),
    	MonitoringAndLogging: &checkpoint.ManagementDomainPermissionsProfileMonitoringAndLoggingArgs{
    		AppAndUrlFilteringLogs:             pulumi.Bool(false),
    		DlpLogsIncludingConfidentialFields: pulumi.Bool(false),
    		HttpsInspectionLogs:                pulumi.Bool(false),
    		Identities:                         pulumi.Bool(false),
    		ManageDlpMessages:                  pulumi.Bool(false),
    		ManagementLogs:                     pulumi.String("string"),
    		Monitoring:                         pulumi.String("string"),
    		PacketCaptureAndForensics:          pulumi.Bool(false),
    		ShowIdentitiesByDefault:            pulumi.Bool(false),
    		ShowPacketCaptureByDefault:         pulumi.Bool(false),
    		TrackLogs:                          pulumi.String("string"),
    	},
    	Name: pulumi.String("string"),
    	Others: &checkpoint.ManagementDomainPermissionsProfileOthersArgs{
    		ClientCertificates:  pulumi.Bool(false),
    		EditCpUsersDb:       pulumi.Bool(false),
    		HttpsInspection:     pulumi.String("string"),
    		LdapUsersDb:         pulumi.String("string"),
    		UserAuthorityAccess: pulumi.String("string"),
    		UserDeviceMgmtConf:  pulumi.String("string"),
    	},
    	PermissionType: pulumi.String("string"),
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	ThreatPrevention: &checkpoint.ManagementDomainPermissionsProfileThreatPreventionArgs{
    		EditLayers:       pulumi.String("string"),
    		EditSettings:     pulumi.Bool(false),
    		InstallPolicy:    pulumi.Bool(false),
    		IpsUpdate:        pulumi.Bool(false),
    		PolicyExceptions: pulumi.String("string"),
    		PolicyLayers:     pulumi.String("string"),
    		Profiles:         pulumi.String("string"),
    		Protections:      pulumi.String("string"),
    	},
    })
    
    var managementDomainPermissionsProfileResource = new ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", ManagementDomainPermissionsProfileArgs.builder()
        .accessControl(ManagementDomainPermissionsProfileAccessControlArgs.builder()
            .accessControlObjectsAndSettings("string")
            .appControlAndUrlFilteringUpdate(false)
            .dlpPolicy("string")
            .geoControlPolicy("string")
            .installPolicy(false)
            .natPolicy("string")
            .policyLayers(ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs.builder()
                .appControlAndUrlFiltering(false)
                .contentAwareness(false)
                .editLayers("string")
                .firewall(false)
                .mobileAccess(false)
                .build())
            .qosPolicy("string")
            .showPolicy(false)
            .build())
        .color("string")
        .comments("string")
        .editCommonObjects(false)
        .endpoint(ManagementDomainPermissionsProfileEndpointArgs.builder()
            .allowExecutingPushOperations(false)
            .authorizePrebootUsers(false)
            .editEndpointPolicies(false)
            .editSoftwareDeployment(false)
            .managePoliciesAndSoftwareDeployment(false)
            .policiesInstallation(false)
            .recoveryMedia(false)
            .remoteHelp(false)
            .resetComputerData(false)
            .softwareDeploymentInstallation(false)
            .build())
        .eventsAndReports(ManagementDomainPermissionsProfileEventsAndReportsArgs.builder()
            .events("string")
            .policy("string")
            .reports(false)
            .smartEvent("string")
            .build())
        .gateways(ManagementDomainPermissionsProfileGatewaysArgs.builder()
            .lsmGwDb("string")
            .manageProvisioningProfiles("string")
            .manageRepositoryScripts("string")
            .openShell(false)
            .runOneTimeScript(false)
            .runRepositoryScript(false)
            .smartUpdate("string")
            .systemBackup(false)
            .systemRestore(false)
            .vsxProvisioning(false)
            .build())
        .ignoreErrors(false)
        .ignoreWarnings(false)
        .management(ManagementDomainPermissionsProfileManagementArgs.builder()
            .approveOrRejectSessions(false)
            .cmeOperations("string")
            .highAvailabilityOperations(false)
            .manageAdmins(false)
            .manageIntegrationWithCloudServices(false)
            .manageSessions(false)
            .managementApiLogin(false)
            .publishSessions(false)
            .build())
        .managementDomainPermissionsProfileId("string")
        .monitoringAndLogging(ManagementDomainPermissionsProfileMonitoringAndLoggingArgs.builder()
            .appAndUrlFilteringLogs(false)
            .dlpLogsIncludingConfidentialFields(false)
            .httpsInspectionLogs(false)
            .identities(false)
            .manageDlpMessages(false)
            .managementLogs("string")
            .monitoring("string")
            .packetCaptureAndForensics(false)
            .showIdentitiesByDefault(false)
            .showPacketCaptureByDefault(false)
            .trackLogs("string")
            .build())
        .name("string")
        .others(ManagementDomainPermissionsProfileOthersArgs.builder()
            .clientCertificates(false)
            .editCpUsersDb(false)
            .httpsInspection("string")
            .ldapUsersDb("string")
            .userAuthorityAccess("string")
            .userDeviceMgmtConf("string")
            .build())
        .permissionType("string")
        .tags("string")
        .threatPrevention(ManagementDomainPermissionsProfileThreatPreventionArgs.builder()
            .editLayers("string")
            .editSettings(false)
            .installPolicy(false)
            .ipsUpdate(false)
            .policyExceptions("string")
            .policyLayers("string")
            .profiles("string")
            .protections("string")
            .build())
        .build());
    
    management_domain_permissions_profile_resource = checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource",
        access_control={
            "access_control_objects_and_settings": "string",
            "app_control_and_url_filtering_update": False,
            "dlp_policy": "string",
            "geo_control_policy": "string",
            "install_policy": False,
            "nat_policy": "string",
            "policy_layers": {
                "app_control_and_url_filtering": False,
                "content_awareness": False,
                "edit_layers": "string",
                "firewall": False,
                "mobile_access": False,
            },
            "qos_policy": "string",
            "show_policy": False,
        },
        color="string",
        comments="string",
        edit_common_objects=False,
        endpoint={
            "allow_executing_push_operations": False,
            "authorize_preboot_users": False,
            "edit_endpoint_policies": False,
            "edit_software_deployment": False,
            "manage_policies_and_software_deployment": False,
            "policies_installation": False,
            "recovery_media": False,
            "remote_help": False,
            "reset_computer_data": False,
            "software_deployment_installation": False,
        },
        events_and_reports={
            "events": "string",
            "policy": "string",
            "reports": False,
            "smart_event": "string",
        },
        gateways={
            "lsm_gw_db": "string",
            "manage_provisioning_profiles": "string",
            "manage_repository_scripts": "string",
            "open_shell": False,
            "run_one_time_script": False,
            "run_repository_script": False,
            "smart_update": "string",
            "system_backup": False,
            "system_restore": False,
            "vsx_provisioning": False,
        },
        ignore_errors=False,
        ignore_warnings=False,
        management={
            "approve_or_reject_sessions": False,
            "cme_operations": "string",
            "high_availability_operations": False,
            "manage_admins": False,
            "manage_integration_with_cloud_services": False,
            "manage_sessions": False,
            "management_api_login": False,
            "publish_sessions": False,
        },
        management_domain_permissions_profile_id="string",
        monitoring_and_logging={
            "app_and_url_filtering_logs": False,
            "dlp_logs_including_confidential_fields": False,
            "https_inspection_logs": False,
            "identities": False,
            "manage_dlp_messages": False,
            "management_logs": "string",
            "monitoring": "string",
            "packet_capture_and_forensics": False,
            "show_identities_by_default": False,
            "show_packet_capture_by_default": False,
            "track_logs": "string",
        },
        name="string",
        others={
            "client_certificates": False,
            "edit_cp_users_db": False,
            "https_inspection": "string",
            "ldap_users_db": "string",
            "user_authority_access": "string",
            "user_device_mgmt_conf": "string",
        },
        permission_type="string",
        tags=["string"],
        threat_prevention={
            "edit_layers": "string",
            "edit_settings": False,
            "install_policy": False,
            "ips_update": False,
            "policy_exceptions": "string",
            "policy_layers": "string",
            "profiles": "string",
            "protections": "string",
        })
    
    const managementDomainPermissionsProfileResource = new checkpoint.ManagementDomainPermissionsProfile("managementDomainPermissionsProfileResource", {
        accessControl: {
            accessControlObjectsAndSettings: "string",
            appControlAndUrlFilteringUpdate: false,
            dlpPolicy: "string",
            geoControlPolicy: "string",
            installPolicy: false,
            natPolicy: "string",
            policyLayers: {
                appControlAndUrlFiltering: false,
                contentAwareness: false,
                editLayers: "string",
                firewall: false,
                mobileAccess: false,
            },
            qosPolicy: "string",
            showPolicy: false,
        },
        color: "string",
        comments: "string",
        editCommonObjects: false,
        endpoint: {
            allowExecutingPushOperations: false,
            authorizePrebootUsers: false,
            editEndpointPolicies: false,
            editSoftwareDeployment: false,
            managePoliciesAndSoftwareDeployment: false,
            policiesInstallation: false,
            recoveryMedia: false,
            remoteHelp: false,
            resetComputerData: false,
            softwareDeploymentInstallation: false,
        },
        eventsAndReports: {
            events: "string",
            policy: "string",
            reports: false,
            smartEvent: "string",
        },
        gateways: {
            lsmGwDb: "string",
            manageProvisioningProfiles: "string",
            manageRepositoryScripts: "string",
            openShell: false,
            runOneTimeScript: false,
            runRepositoryScript: false,
            smartUpdate: "string",
            systemBackup: false,
            systemRestore: false,
            vsxProvisioning: false,
        },
        ignoreErrors: false,
        ignoreWarnings: false,
        management: {
            approveOrRejectSessions: false,
            cmeOperations: "string",
            highAvailabilityOperations: false,
            manageAdmins: false,
            manageIntegrationWithCloudServices: false,
            manageSessions: false,
            managementApiLogin: false,
            publishSessions: false,
        },
        managementDomainPermissionsProfileId: "string",
        monitoringAndLogging: {
            appAndUrlFilteringLogs: false,
            dlpLogsIncludingConfidentialFields: false,
            httpsInspectionLogs: false,
            identities: false,
            manageDlpMessages: false,
            managementLogs: "string",
            monitoring: "string",
            packetCaptureAndForensics: false,
            showIdentitiesByDefault: false,
            showPacketCaptureByDefault: false,
            trackLogs: "string",
        },
        name: "string",
        others: {
            clientCertificates: false,
            editCpUsersDb: false,
            httpsInspection: "string",
            ldapUsersDb: "string",
            userAuthorityAccess: "string",
            userDeviceMgmtConf: "string",
        },
        permissionType: "string",
        tags: ["string"],
        threatPrevention: {
            editLayers: "string",
            editSettings: false,
            installPolicy: false,
            ipsUpdate: false,
            policyExceptions: "string",
            policyLayers: "string",
            profiles: "string",
            protections: "string",
        },
    });
    
    type: checkpoint:ManagementDomainPermissionsProfile
    properties:
        accessControl:
            accessControlObjectsAndSettings: string
            appControlAndUrlFilteringUpdate: false
            dlpPolicy: string
            geoControlPolicy: string
            installPolicy: false
            natPolicy: string
            policyLayers:
                appControlAndUrlFiltering: false
                contentAwareness: false
                editLayers: string
                firewall: false
                mobileAccess: false
            qosPolicy: string
            showPolicy: false
        color: string
        comments: string
        editCommonObjects: false
        endpoint:
            allowExecutingPushOperations: false
            authorizePrebootUsers: false
            editEndpointPolicies: false
            editSoftwareDeployment: false
            managePoliciesAndSoftwareDeployment: false
            policiesInstallation: false
            recoveryMedia: false
            remoteHelp: false
            resetComputerData: false
            softwareDeploymentInstallation: false
        eventsAndReports:
            events: string
            policy: string
            reports: false
            smartEvent: string
        gateways:
            lsmGwDb: string
            manageProvisioningProfiles: string
            manageRepositoryScripts: string
            openShell: false
            runOneTimeScript: false
            runRepositoryScript: false
            smartUpdate: string
            systemBackup: false
            systemRestore: false
            vsxProvisioning: false
        ignoreErrors: false
        ignoreWarnings: false
        management:
            approveOrRejectSessions: false
            cmeOperations: string
            highAvailabilityOperations: false
            manageAdmins: false
            manageIntegrationWithCloudServices: false
            manageSessions: false
            managementApiLogin: false
            publishSessions: false
        managementDomainPermissionsProfileId: string
        monitoringAndLogging:
            appAndUrlFilteringLogs: false
            dlpLogsIncludingConfidentialFields: false
            httpsInspectionLogs: false
            identities: false
            manageDlpMessages: false
            managementLogs: string
            monitoring: string
            packetCaptureAndForensics: false
            showIdentitiesByDefault: false
            showPacketCaptureByDefault: false
            trackLogs: string
        name: string
        others:
            clientCertificates: false
            editCpUsersDb: false
            httpsInspection: string
            ldapUsersDb: string
            userAuthorityAccess: string
            userDeviceMgmtConf: string
        permissionType: string
        tags:
            - string
        threatPrevention:
            editLayers: string
            editSettings: false
            installPolicy: false
            ipsUpdate: false
            policyExceptions: string
            policyLayers: string
            profiles: string
            protections: string
    

    ManagementDomainPermissionsProfile Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The ManagementDomainPermissionsProfile resource accepts the following input properties:

    AccessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags List<string>
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    AccessControl ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint ManagementDomainPermissionsProfileEndpointArgs
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports ManagementDomainPermissionsProfileEventsAndReportsArgs
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways ManagementDomainPermissionsProfileGatewaysArgs
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management ManagementDomainPermissionsProfileManagementArgs
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLoggingArgs
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others ManagementDomainPermissionsProfileOthersArgs
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags []string
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention ManagementDomainPermissionsProfileThreatPreventionArgs
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color string
    Color of the object. Should be one of existing colors.
    comments string
    Comments string.
    editCommonObjects boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId string
    monitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name string
    Object name.
    others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType string
    The type of the Permissions Profile.
    tags string[]
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    access_control ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color str
    Color of the object. Should be one of existing colors.
    comments str
    Comments string.
    edit_common_objects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpointArgs
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    events_and_reports ManagementDomainPermissionsProfileEventsAndReportsArgs
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGatewaysArgs
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagementArgs
    Management permissions.management blocks are documented below.
    management_domain_permissions_profile_id str
    monitoring_and_logging ManagementDomainPermissionsProfileMonitoringAndLoggingArgs
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name str
    Object name.
    others ManagementDomainPermissionsProfileOthersArgs
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permission_type str
    The type of the Permissions Profile.
    tags Sequence[str]
    Collection of tag identifiers.tags blocks are documented below.
    threat_prevention ManagementDomainPermissionsProfileThreatPreventionArgs
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl Property Map
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Property Map
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Property Map
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Property Map
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Property Map
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Property Map
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Property Map
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Property Map
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the ManagementDomainPermissionsProfile resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing ManagementDomainPermissionsProfile Resource

    Get an existing ManagementDomainPermissionsProfile resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: ManagementDomainPermissionsProfileState, opts?: CustomResourceOptions): ManagementDomainPermissionsProfile
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_control: Optional[ManagementDomainPermissionsProfileAccessControlArgs] = None,
            color: Optional[str] = None,
            comments: Optional[str] = None,
            edit_common_objects: Optional[bool] = None,
            endpoint: Optional[ManagementDomainPermissionsProfileEndpointArgs] = None,
            events_and_reports: Optional[ManagementDomainPermissionsProfileEventsAndReportsArgs] = None,
            gateways: Optional[ManagementDomainPermissionsProfileGatewaysArgs] = None,
            ignore_errors: Optional[bool] = None,
            ignore_warnings: Optional[bool] = None,
            management: Optional[ManagementDomainPermissionsProfileManagementArgs] = None,
            management_domain_permissions_profile_id: Optional[str] = None,
            monitoring_and_logging: Optional[ManagementDomainPermissionsProfileMonitoringAndLoggingArgs] = None,
            name: Optional[str] = None,
            others: Optional[ManagementDomainPermissionsProfileOthersArgs] = None,
            permission_type: Optional[str] = None,
            tags: Optional[Sequence[str]] = None,
            threat_prevention: Optional[ManagementDomainPermissionsProfileThreatPreventionArgs] = None) -> ManagementDomainPermissionsProfile
    func GetManagementDomainPermissionsProfile(ctx *Context, name string, id IDInput, state *ManagementDomainPermissionsProfileState, opts ...ResourceOption) (*ManagementDomainPermissionsProfile, error)
    public static ManagementDomainPermissionsProfile Get(string name, Input<string> id, ManagementDomainPermissionsProfileState? state, CustomResourceOptions? opts = null)
    public static ManagementDomainPermissionsProfile get(String name, Output<String> id, ManagementDomainPermissionsProfileState state, CustomResourceOptions options)
    resources:  _:    type: checkpoint:ManagementDomainPermissionsProfile    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags List<string>
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    AccessControl ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    Color string
    Color of the object. Should be one of existing colors.
    Comments string
    Comments string.
    EditCommonObjects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    Endpoint ManagementDomainPermissionsProfileEndpointArgs
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    EventsAndReports ManagementDomainPermissionsProfileEventsAndReportsArgs
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    Gateways ManagementDomainPermissionsProfileGatewaysArgs
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    IgnoreErrors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    IgnoreWarnings bool
    Apply changes ignoring warnings.
    Management ManagementDomainPermissionsProfileManagementArgs
    Management permissions.management blocks are documented below.
    ManagementDomainPermissionsProfileId string
    MonitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLoggingArgs
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    Name string
    Object name.
    Others ManagementDomainPermissionsProfileOthersArgs
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    PermissionType string
    The type of the Permissions Profile.
    Tags []string
    Collection of tag identifiers.tags blocks are documented below.
    ThreatPrevention ManagementDomainPermissionsProfileThreatPreventionArgs
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl ManagementDomainPermissionsProfileAccessControl
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color string
    Color of the object. Should be one of existing colors.
    comments string
    Comments string.
    editCommonObjects boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpoint
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports ManagementDomainPermissionsProfileEventsAndReports
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGateways
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings boolean
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagement
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId string
    monitoringAndLogging ManagementDomainPermissionsProfileMonitoringAndLogging
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name string
    Object name.
    others ManagementDomainPermissionsProfileOthers
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType string
    The type of the Permissions Profile.
    tags string[]
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention ManagementDomainPermissionsProfileThreatPrevention
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    access_control ManagementDomainPermissionsProfileAccessControlArgs
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color str
    Color of the object. Should be one of existing colors.
    comments str
    Comments string.
    edit_common_objects bool
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint ManagementDomainPermissionsProfileEndpointArgs
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    events_and_reports ManagementDomainPermissionsProfileEventsAndReportsArgs
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways ManagementDomainPermissionsProfileGatewaysArgs
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignore_errors bool
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignore_warnings bool
    Apply changes ignoring warnings.
    management ManagementDomainPermissionsProfileManagementArgs
    Management permissions.management blocks are documented below.
    management_domain_permissions_profile_id str
    monitoring_and_logging ManagementDomainPermissionsProfileMonitoringAndLoggingArgs
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name str
    Object name.
    others ManagementDomainPermissionsProfileOthersArgs
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permission_type str
    The type of the Permissions Profile.
    tags Sequence[str]
    Collection of tag identifiers.tags blocks are documented below.
    threat_prevention ManagementDomainPermissionsProfileThreatPreventionArgs
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.
    accessControl Property Map
    Access Control permissions.Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.
    color String
    Color of the object. Should be one of existing colors.
    comments String
    Comments string.
    editCommonObjects Boolean
    Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.Only a 'Customized' permission-type profile can edit this permission.
    endpoint Property Map
    Endpoint permissions. Not supported for Multi-Domain Servers.Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.
    eventsAndReports Property Map
    Events and Reports permissions.Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.
    gateways Property Map
    Gateways permissions. Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.
    ignoreErrors Boolean
    Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.
    ignoreWarnings Boolean
    Apply changes ignoring warnings.
    management Property Map
    Management permissions.management blocks are documented below.
    managementDomainPermissionsProfileId String
    monitoringAndLogging Property Map
    Monitoring and Logging permissions.'Customized' permission-type profile can edit all these permissions. "Read Write All" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.
    name String
    Object name.
    others Property Map
    Additional permissions.Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.
    permissionType String
    The type of the Permissions Profile.
    tags List<String>
    Collection of tag identifiers.tags blocks are documented below.
    threatPrevention Property Map
    Threat Prevention permissions.Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.

    Supporting Types

    ManagementDomainPermissionsProfileAccessControl, ManagementDomainPermissionsProfileAccessControlArgs

    AccessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    AppControlAndUrlFilteringUpdate bool
    Install Application and URL Filtering updates.
    DlpPolicy string
    Configure DLP rules and Policies.
    GeoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    InstallPolicy bool
    Install Access Control Policies.
    NatPolicy string
    Work with NAT in Access Control rules.
    PolicyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    QosPolicy string
    Work with QoS Policies and rules.
    ShowPolicy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    AccessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    AppControlAndUrlFilteringUpdate bool
    Install Application and URL Filtering updates.
    DlpPolicy string
    Configure DLP rules and Policies.
    GeoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    InstallPolicy bool
    Install Access Control Policies.
    NatPolicy string
    Work with NAT in Access Control rules.
    PolicyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    QosPolicy string
    Work with QoS Policies and rules.
    ShowPolicy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings String
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate Boolean
    Install Application and URL Filtering updates.
    dlpPolicy String
    Configure DLP rules and Policies.
    geoControlPolicy String
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy Boolean
    Install Access Control Policies.
    natPolicy String
    Work with NAT in Access Control rules.
    policyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy String
    Work with QoS Policies and rules.
    showPolicy Boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings string
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate boolean
    Install Application and URL Filtering updates.
    dlpPolicy string
    Configure DLP rules and Policies.
    geoControlPolicy string
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy boolean
    Install Access Control Policies.
    natPolicy string
    Work with NAT in Access Control rules.
    policyLayers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy string
    Work with QoS Policies and rules.
    showPolicy boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    access_control_objects_and_settings str
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    app_control_and_url_filtering_update bool
    Install Application and URL Filtering updates.
    dlp_policy str
    Configure DLP rules and Policies.
    geo_control_policy str
    Work with Access Control rules that control traffic to and from specified countries.
    install_policy bool
    Install Access Control Policies.
    nat_policy str
    Work with NAT in Access Control rules.
    policy_layers ManagementDomainPermissionsProfileAccessControlPolicyLayers
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qos_policy str
    Work with QoS Policies and rules.
    show_policy bool
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.
    accessControlObjectsAndSettings String
    Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.
    appControlAndUrlFilteringUpdate Boolean
    Install Application and URL Filtering updates.
    dlpPolicy String
    Configure DLP rules and Policies.
    geoControlPolicy String
    Work with Access Control rules that control traffic to and from specified countries.
    installPolicy Boolean
    Install Access Control Policies.
    natPolicy String
    Work with NAT in Access Control rules.
    policyLayers Property Map
    Layer editing permissions.Available only if show-policy is set to true.policy_layers blocks are documented below.
    qosPolicy String
    Work with QoS Policies and rules.
    showPolicy Boolean
    Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.

    ManagementDomainPermissionsProfileAccessControlPolicyLayers, ManagementDomainPermissionsProfileAccessControlPolicyLayersArgs

    AppControlAndUrlFiltering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    ContentAwareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    EditLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    Firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    MobileAccess bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    AppControlAndUrlFiltering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    ContentAwareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    EditLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    Firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    MobileAccess bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering Boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness Boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers String
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall Boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess Boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers string
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    app_control_and_url_filtering bool
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    content_awareness bool
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    edit_layers str
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall bool
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobile_access bool
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".
    appControlAndUrlFiltering Boolean
    Use Application and URL Filtering in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    contentAwareness Boolean
    Use specified data types in Access Control rules.Available only if edit-layers is set to "By Software Blades".
    editLayers String
    "By Software Blades" - Edit Access Control layers that contain the blades enabled in the Permissions Profile."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.
    firewall Boolean
    Work with Access Control and other Software Blades that do not have their own Policies.Available only if edit-layers is set to "By Software Blades".
    mobileAccess Boolean
    Work with Mobile Access rules.Available only if edit-layers is set to "By Software Blades".

    ManagementDomainPermissionsProfileEndpoint, ManagementDomainPermissionsProfileEndpointArgs

    AllowExecutingPushOperations bool
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    AuthorizePrebootUsers bool
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    EditEndpointPolicies bool
    Available only if manage-policies-and-software-deployment is set to true.
    EditSoftwareDeployment bool
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    ManagePoliciesAndSoftwareDeployment bool
    The administrator can work with policies, rules and actions.
    PoliciesInstallation bool
    The administrator can install policies on endpoint computers.
    RecoveryMedia bool
    The administrator can create recovery media on endpoint computers and devices.
    RemoteHelp bool
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    ResetComputerData bool
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    SoftwareDeploymentInstallation bool
    The administrator can deploy packages and install endpoint clients.
    AllowExecutingPushOperations bool
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    AuthorizePrebootUsers bool
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    EditEndpointPolicies bool
    Available only if manage-policies-and-software-deployment is set to true.
    EditSoftwareDeployment bool
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    ManagePoliciesAndSoftwareDeployment bool
    The administrator can work with policies, rules and actions.
    PoliciesInstallation bool
    The administrator can install policies on endpoint computers.
    RecoveryMedia bool
    The administrator can create recovery media on endpoint computers and devices.
    RemoteHelp bool
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    ResetComputerData bool
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    SoftwareDeploymentInstallation bool
    The administrator can deploy packages and install endpoint clients.
    allowExecutingPushOperations Boolean
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    authorizePrebootUsers Boolean
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    editEndpointPolicies Boolean
    Available only if manage-policies-and-software-deployment is set to true.
    editSoftwareDeployment Boolean
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    managePoliciesAndSoftwareDeployment Boolean
    The administrator can work with policies, rules and actions.
    policiesInstallation Boolean
    The administrator can install policies on endpoint computers.
    recoveryMedia Boolean
    The administrator can create recovery media on endpoint computers and devices.
    remoteHelp Boolean
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    resetComputerData Boolean
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    softwareDeploymentInstallation Boolean
    The administrator can deploy packages and install endpoint clients.
    allowExecutingPushOperations boolean
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    authorizePrebootUsers boolean
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    editEndpointPolicies boolean
    Available only if manage-policies-and-software-deployment is set to true.
    editSoftwareDeployment boolean
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    managePoliciesAndSoftwareDeployment boolean
    The administrator can work with policies, rules and actions.
    policiesInstallation boolean
    The administrator can install policies on endpoint computers.
    recoveryMedia boolean
    The administrator can create recovery media on endpoint computers and devices.
    remoteHelp boolean
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    resetComputerData boolean
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    softwareDeploymentInstallation boolean
    The administrator can deploy packages and install endpoint clients.
    allow_executing_push_operations bool
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    authorize_preboot_users bool
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    edit_endpoint_policies bool
    Available only if manage-policies-and-software-deployment is set to true.
    edit_software_deployment bool
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    manage_policies_and_software_deployment bool
    The administrator can work with policies, rules and actions.
    policies_installation bool
    The administrator can install policies on endpoint computers.
    recovery_media bool
    The administrator can create recovery media on endpoint computers and devices.
    remote_help bool
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    reset_computer_data bool
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    software_deployment_installation bool
    The administrator can deploy packages and install endpoint clients.
    allowExecutingPushOperations Boolean
    The administrator can start operations that the Security Management Server pushes directly to client computers with no policy installation required.
    authorizePrebootUsers Boolean
    The administrator can add and remove the users who are permitted to log on to Endpoint Security client computers with Full Disk Encryption.
    editEndpointPolicies Boolean
    Available only if manage-policies-and-software-deployment is set to true.
    editSoftwareDeployment Boolean
    The administrator can define deployment rules, create packages for export, and configure advanced package settings.Available only if manage-policies-and-software-deployment is set to true.
    managePoliciesAndSoftwareDeployment Boolean
    The administrator can work with policies, rules and actions.
    policiesInstallation Boolean
    The administrator can install policies on endpoint computers.
    recoveryMedia Boolean
    The administrator can create recovery media on endpoint computers and devices.
    remoteHelp Boolean
    The administrator can use the Remote Help feature to reset user passwords and give access to locked out users.
    resetComputerData Boolean
    The administrator can reset a computer, which deletes all information about the computer from the Security Management Server.
    softwareDeploymentInstallation Boolean
    The administrator can deploy packages and install endpoint clients.

    ManagementDomainPermissionsProfileEventsAndReports, ManagementDomainPermissionsProfileEventsAndReportsArgs

    Events string
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    Policy string
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    Reports bool
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    SmartEvent string
    'Custom' - Configure SmartEvent permissions.
    Events string
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    Policy string
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    Reports bool
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    SmartEvent string
    'Custom' - Configure SmartEvent permissions.
    events String
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    policy String
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    reports Boolean
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    smartEvent String
    'Custom' - Configure SmartEvent permissions.
    events string
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    policy string
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    reports boolean
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    smartEvent string
    'Custom' - Configure SmartEvent permissions.
    events str
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    policy str
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    reports bool
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    smart_event str
    'Custom' - Configure SmartEvent permissions.
    events String
    Work with event queries on the Events tab. Create custom event queries.Available only if smart-event is set to 'Custom'.
    policy String
    Configure SmartEvent Policy rules and install SmartEvent Policies.Available only if smart-event is set to 'Custom'.
    reports Boolean
    Create and run SmartEvent reports.Available only if smart-event is set to 'Custom'.
    smartEvent String
    'Custom' - Configure SmartEvent permissions.

    ManagementDomainPermissionsProfileGateways, ManagementDomainPermissionsProfileGatewaysArgs

    LsmGwDb string
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    ManageProvisioningProfiles string
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    ManageRepositoryScripts string
    Add, change and remove scripts in the repository.
    OpenShell bool
    Use the SmartConsole CLI to run commands.
    RunOneTimeScript bool
    Run user scripts from the command line.
    RunRepositoryScript bool
    Run scripts from the repository.
    SmartUpdate string
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    SystemBackup bool
    Backup Security Gateways.
    SystemRestore bool
    Restore Security Gateways from saved backups.
    VsxProvisioning bool
    Create and configure Virtual Systems and other VSX virtual objects.
    LsmGwDb string
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    ManageProvisioningProfiles string
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    ManageRepositoryScripts string
    Add, change and remove scripts in the repository.
    OpenShell bool
    Use the SmartConsole CLI to run commands.
    RunOneTimeScript bool
    Run user scripts from the command line.
    RunRepositoryScript bool
    Run scripts from the repository.
    SmartUpdate string
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    SystemBackup bool
    Backup Security Gateways.
    SystemRestore bool
    Restore Security Gateways from saved backups.
    VsxProvisioning bool
    Create and configure Virtual Systems and other VSX virtual objects.
    lsmGwDb String
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    manageProvisioningProfiles String
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    manageRepositoryScripts String
    Add, change and remove scripts in the repository.
    openShell Boolean
    Use the SmartConsole CLI to run commands.
    runOneTimeScript Boolean
    Run user scripts from the command line.
    runRepositoryScript Boolean
    Run scripts from the repository.
    smartUpdate String
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    systemBackup Boolean
    Backup Security Gateways.
    systemRestore Boolean
    Restore Security Gateways from saved backups.
    vsxProvisioning Boolean
    Create and configure Virtual Systems and other VSX virtual objects.
    lsmGwDb string
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    manageProvisioningProfiles string
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    manageRepositoryScripts string
    Add, change and remove scripts in the repository.
    openShell boolean
    Use the SmartConsole CLI to run commands.
    runOneTimeScript boolean
    Run user scripts from the command line.
    runRepositoryScript boolean
    Run scripts from the repository.
    smartUpdate string
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    systemBackup boolean
    Backup Security Gateways.
    systemRestore boolean
    Restore Security Gateways from saved backups.
    vsxProvisioning boolean
    Create and configure Virtual Systems and other VSX virtual objects.
    lsm_gw_db str
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    manage_provisioning_profiles str
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    manage_repository_scripts str
    Add, change and remove scripts in the repository.
    open_shell bool
    Use the SmartConsole CLI to run commands.
    run_one_time_script bool
    Run user scripts from the command line.
    run_repository_script bool
    Run scripts from the repository.
    smart_update str
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    system_backup bool
    Backup Security Gateways.
    system_restore bool
    Restore Security Gateways from saved backups.
    vsx_provisioning bool
    Create and configure Virtual Systems and other VSX virtual objects.
    lsmGwDb String
    Access to objects defined in LSM gateway tables. These objects are managed in the SmartProvisioning GUI or LSMcli command-line.Note: 'Write' permission on lsm-gw-db allows administrator to run a script on SmartLSM gateway in Expert mode.
    manageProvisioningProfiles String
    Administrator can add, edit, delete, and assign provisioning profiles to gateways (both LSM and non-LSM).Available for edit only if lsm-gw-db is set with 'Write' permission.Note: 'Read' permission on lsm-gw-db enables 'Read' permission for manage-provisioning-profiles.
    manageRepositoryScripts String
    Add, change and remove scripts in the repository.
    openShell Boolean
    Use the SmartConsole CLI to run commands.
    runOneTimeScript Boolean
    Run user scripts from the command line.
    runRepositoryScript Boolean
    Run scripts from the repository.
    smartUpdate String
    Install, update and delete Check Point licenses. This includes permissions to use SmartUpdate to manage licenses.
    systemBackup Boolean
    Backup Security Gateways.
    systemRestore Boolean
    Restore Security Gateways from saved backups.
    vsxProvisioning Boolean
    Create and configure Virtual Systems and other VSX virtual objects.

    ManagementDomainPermissionsProfileManagement, ManagementDomainPermissionsProfileManagementArgs

    ApproveOrRejectSessions bool
    Approve / reject other sessions.
    CmeOperations string
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    HighAvailabilityOperations bool
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    ManageAdmins bool
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    ManageIntegrationWithCloudServices bool
    Manage integration with Cloud Services.
    ManageSessions bool
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    ManagementApiLogin bool
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    PublishSessions bool
    Allow session publishing without an approval.
    ApproveOrRejectSessions bool
    Approve / reject other sessions.
    CmeOperations string
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    HighAvailabilityOperations bool
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    ManageAdmins bool
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    ManageIntegrationWithCloudServices bool
    Manage integration with Cloud Services.
    ManageSessions bool
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    ManagementApiLogin bool
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    PublishSessions bool
    Allow session publishing without an approval.
    approveOrRejectSessions Boolean
    Approve / reject other sessions.
    cmeOperations String
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    highAvailabilityOperations Boolean
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    manageAdmins Boolean
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    manageIntegrationWithCloudServices Boolean
    Manage integration with Cloud Services.
    manageSessions Boolean
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    managementApiLogin Boolean
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    publishSessions Boolean
    Allow session publishing without an approval.
    approveOrRejectSessions boolean
    Approve / reject other sessions.
    cmeOperations string
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    highAvailabilityOperations boolean
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    manageAdmins boolean
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    manageIntegrationWithCloudServices boolean
    Manage integration with Cloud Services.
    manageSessions boolean
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    managementApiLogin boolean
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    publishSessions boolean
    Allow session publishing without an approval.
    approve_or_reject_sessions bool
    Approve / reject other sessions.
    cme_operations str
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    high_availability_operations bool
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    manage_admins bool
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    manage_integration_with_cloud_services bool
    Manage integration with Cloud Services.
    manage_sessions bool
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    management_api_login bool
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    publish_sessions bool
    Allow session publishing without an approval.
    approveOrRejectSessions Boolean
    Approve / reject other sessions.
    cmeOperations String
    Permission to read / edit the Cloud Management Extension (CME) configuration.Not supported for Multi-Domain Servers.
    highAvailabilityOperations Boolean
    Configure and work with Domain High Availability.Only a 'Customized' permission-type profile can edit this permission.
    manageAdmins Boolean
    Controls the ability to manage Administrators, Permission Profiles, Trusted clients,API settings and Policy settings.Only a "Read Write All" permission-type profile can edit this permission.Not supported for Multi-Domain Servers.
    manageIntegrationWithCloudServices Boolean
    Manage integration with Cloud Services.
    manageSessions Boolean
    Lets you disconnect, discard, publish, or take over other administrator sessions.Only a "Read Write All" permission-type profile can edit this permission.
    managementApiLogin Boolean
    Permission to log in to the Security Management Server and run API commands using thesetools: mgmt_cli (Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.Note: This permission is not required to run commands from within the API terminal in SmartConsole.Not supported for Multi-Domain Servers.
    publishSessions Boolean
    Allow session publishing without an approval.

    ManagementDomainPermissionsProfileMonitoringAndLogging, ManagementDomainPermissionsProfileMonitoringAndLoggingArgs

    AppAndUrlFilteringLogs bool
    Work with Application and URL Filtering logs.
    DlpLogsIncludingConfidentialFields bool
    Show DLP logs including confidential fields.
    HttpsInspectionLogs bool
    See logs generated by HTTPS Inspection.
    Identities bool
    Show user and computer identity information in logs.
    ManageDlpMessages bool
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    ManagementLogs string
    See Multi-Domain Server audit logs.
    Monitoring string
    See monitoring views and reports.
    PacketCaptureAndForensics bool
    See logs generated by the IPS and Forensics features.
    ShowIdentitiesByDefault bool
    Show user and computer identity information in logs by default.
    ShowPacketCaptureByDefault bool
    Enable packet capture by default.
    TrackLogs string
    Use the log tracking features in SmartConsole.
    AppAndUrlFilteringLogs bool
    Work with Application and URL Filtering logs.
    DlpLogsIncludingConfidentialFields bool
    Show DLP logs including confidential fields.
    HttpsInspectionLogs bool
    See logs generated by HTTPS Inspection.
    Identities bool
    Show user and computer identity information in logs.
    ManageDlpMessages bool
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    ManagementLogs string
    See Multi-Domain Server audit logs.
    Monitoring string
    See monitoring views and reports.
    PacketCaptureAndForensics bool
    See logs generated by the IPS and Forensics features.
    ShowIdentitiesByDefault bool
    Show user and computer identity information in logs by default.
    ShowPacketCaptureByDefault bool
    Enable packet capture by default.
    TrackLogs string
    Use the log tracking features in SmartConsole.
    appAndUrlFilteringLogs Boolean
    Work with Application and URL Filtering logs.
    dlpLogsIncludingConfidentialFields Boolean
    Show DLP logs including confidential fields.
    httpsInspectionLogs Boolean
    See logs generated by HTTPS Inspection.
    identities Boolean
    Show user and computer identity information in logs.
    manageDlpMessages Boolean
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    managementLogs String
    See Multi-Domain Server audit logs.
    monitoring String
    See monitoring views and reports.
    packetCaptureAndForensics Boolean
    See logs generated by the IPS and Forensics features.
    showIdentitiesByDefault Boolean
    Show user and computer identity information in logs by default.
    showPacketCaptureByDefault Boolean
    Enable packet capture by default.
    trackLogs String
    Use the log tracking features in SmartConsole.
    appAndUrlFilteringLogs boolean
    Work with Application and URL Filtering logs.
    dlpLogsIncludingConfidentialFields boolean
    Show DLP logs including confidential fields.
    httpsInspectionLogs boolean
    See logs generated by HTTPS Inspection.
    identities boolean
    Show user and computer identity information in logs.
    manageDlpMessages boolean
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    managementLogs string
    See Multi-Domain Server audit logs.
    monitoring string
    See monitoring views and reports.
    packetCaptureAndForensics boolean
    See logs generated by the IPS and Forensics features.
    showIdentitiesByDefault boolean
    Show user and computer identity information in logs by default.
    showPacketCaptureByDefault boolean
    Enable packet capture by default.
    trackLogs string
    Use the log tracking features in SmartConsole.
    app_and_url_filtering_logs bool
    Work with Application and URL Filtering logs.
    dlp_logs_including_confidential_fields bool
    Show DLP logs including confidential fields.
    https_inspection_logs bool
    See logs generated by HTTPS Inspection.
    identities bool
    Show user and computer identity information in logs.
    manage_dlp_messages bool
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    management_logs str
    See Multi-Domain Server audit logs.
    monitoring str
    See monitoring views and reports.
    packet_capture_and_forensics bool
    See logs generated by the IPS and Forensics features.
    show_identities_by_default bool
    Show user and computer identity information in logs by default.
    show_packet_capture_by_default bool
    Enable packet capture by default.
    track_logs str
    Use the log tracking features in SmartConsole.
    appAndUrlFilteringLogs Boolean
    Work with Application and URL Filtering logs.
    dlpLogsIncludingConfidentialFields Boolean
    Show DLP logs including confidential fields.
    httpsInspectionLogs Boolean
    See logs generated by HTTPS Inspection.
    identities Boolean
    Show user and computer identity information in logs.
    manageDlpMessages Boolean
    View/Release/Discard DLP messages.Available only if dlp-logs-including-confidential-fields is set to true.
    managementLogs String
    See Multi-Domain Server audit logs.
    monitoring String
    See monitoring views and reports.
    packetCaptureAndForensics Boolean
    See logs generated by the IPS and Forensics features.
    showIdentitiesByDefault Boolean
    Show user and computer identity information in logs by default.
    showPacketCaptureByDefault Boolean
    Enable packet capture by default.
    trackLogs String
    Use the log tracking features in SmartConsole.

    ManagementDomainPermissionsProfileOthers, ManagementDomainPermissionsProfileOthersArgs

    ClientCertificates bool
    Create and manage client certificates for Mobile Access.
    EditCpUsersDb bool
    Work with user accounts and groups.
    HttpsInspection string
    Enable and configure HTTPS Inspection rules.
    LdapUsersDb string
    Work with the LDAP database and user accounts, groups and OUs.
    UserAuthorityAccess string
    Work with Check Point User Authority authentication.
    UserDeviceMgmtConf string
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.
    ClientCertificates bool
    Create and manage client certificates for Mobile Access.
    EditCpUsersDb bool
    Work with user accounts and groups.
    HttpsInspection string
    Enable and configure HTTPS Inspection rules.
    LdapUsersDb string
    Work with the LDAP database and user accounts, groups and OUs.
    UserAuthorityAccess string
    Work with Check Point User Authority authentication.
    UserDeviceMgmtConf string
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.
    clientCertificates Boolean
    Create and manage client certificates for Mobile Access.
    editCpUsersDb Boolean
    Work with user accounts and groups.
    httpsInspection String
    Enable and configure HTTPS Inspection rules.
    ldapUsersDb String
    Work with the LDAP database and user accounts, groups and OUs.
    userAuthorityAccess String
    Work with Check Point User Authority authentication.
    userDeviceMgmtConf String
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.
    clientCertificates boolean
    Create and manage client certificates for Mobile Access.
    editCpUsersDb boolean
    Work with user accounts and groups.
    httpsInspection string
    Enable and configure HTTPS Inspection rules.
    ldapUsersDb string
    Work with the LDAP database and user accounts, groups and OUs.
    userAuthorityAccess string
    Work with Check Point User Authority authentication.
    userDeviceMgmtConf string
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.
    client_certificates bool
    Create and manage client certificates for Mobile Access.
    edit_cp_users_db bool
    Work with user accounts and groups.
    https_inspection str
    Enable and configure HTTPS Inspection rules.
    ldap_users_db str
    Work with the LDAP database and user accounts, groups and OUs.
    user_authority_access str
    Work with Check Point User Authority authentication.
    user_device_mgmt_conf str
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.
    clientCertificates Boolean
    Create and manage client certificates for Mobile Access.
    editCpUsersDb Boolean
    Work with user accounts and groups.
    httpsInspection String
    Enable and configure HTTPS Inspection rules.
    ldapUsersDb String
    Work with the LDAP database and user accounts, groups and OUs.
    userAuthorityAccess String
    Work with Check Point User Authority authentication.
    userDeviceMgmtConf String
    Gives access to the UDM (User & Device Management) web-based application that handles security challenges in a "bring your own device" (BYOD) workspace.

    ManagementDomainPermissionsProfileThreatPrevention, ManagementDomainPermissionsProfileThreatPreventionArgs

    EditLayers string
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    EditSettings bool
    Work with general Threat Prevention settings.
    InstallPolicy bool
    Install Policies.
    IpsUpdate bool
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    PolicyExceptions string
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    PolicyLayers string
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    Profiles string
    Configure Threat Prevention profiles.
    Protections string
    Work with malware protections.
    EditLayers string
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    EditSettings bool
    Work with general Threat Prevention settings.
    InstallPolicy bool
    Install Policies.
    IpsUpdate bool
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    PolicyExceptions string
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    PolicyLayers string
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    Profiles string
    Configure Threat Prevention profiles.
    Protections string
    Work with malware protections.
    editLayers String
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    editSettings Boolean
    Work with general Threat Prevention settings.
    installPolicy Boolean
    Install Policies.
    ipsUpdate Boolean
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    policyExceptions String
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    policyLayers String
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    profiles String
    Configure Threat Prevention profiles.
    protections String
    Work with malware protections.
    editLayers string
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    editSettings boolean
    Work with general Threat Prevention settings.
    installPolicy boolean
    Install Policies.
    ipsUpdate boolean
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    policyExceptions string
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    policyLayers string
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    profiles string
    Configure Threat Prevention profiles.
    protections string
    Work with malware protections.
    edit_layers str
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    edit_settings bool
    Work with general Threat Prevention settings.
    install_policy bool
    Install Policies.
    ips_update bool
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    policy_exceptions str
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    policy_layers str
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    profiles str
    Configure Threat Prevention profiles.
    protections str
    Work with malware protections.
    editLayers String
    'ALL' - Gives permission to edit all layers."By Selected Profile In A Layer Editor" - Administrators can only edit the layer if the Threat Prevention layer editor gives editing permission to their profiles.Available only if policy-layers is set to 'Write'.
    editSettings Boolean
    Work with general Threat Prevention settings.
    installPolicy Boolean
    Install Policies.
    ipsUpdate Boolean
    Update IPS protections.Note: You do not have to log into the User Center to receive IPS updates.
    policyExceptions String
    Configure exceptions to Threat Prevention rules.Note: To have policy-exceptions you must set the protections permission.
    policyLayers String
    Configure Threat Prevention Policy rules.Note: To have policy-layers permissions you must set policy-exceptionsand profiles permissions. To have 'Write' permissions for policy-layers, policy-exceptions must be set with 'Write' permission as well.
    profiles String
    Configure Threat Prevention profiles.
    protections String
    Work with malware protections.

    Package Details

    Repository
    checkpoint checkpointsw/terraform-provider-checkpoint
    License
    Notes
    This Pulumi package is based on the checkpoint Terraform Provider.
    Viewing docs for checkpoint 3.0.0
    published on Monday, Mar 30, 2026 by checkpointsw
      Try Pulumi Cloud free. Your team will thank you.