Which of the following cannot be configured in an Access Role Object?
The verified answer is D) Time.
Networks: IP addresses or network objects that define the source or destination of the traffic.
Machines: Specific hosts or machine groups that are identified by their MAC addresses or certificates.
Users: Specific users or user groups that are authenticated by one or more identity sources, such as Active Directory, LDAP, or Identity Awareness.
LDAP group vs Access role objects - Check Point CheckMates3
Melynda
4 months agoYuki
4 months agoDana
4 months agoNelida
4 months agoDudley
5 months agoHuey
5 months agoAlexis
5 months agoShawn
5 months agoOliva
5 months agoOzell
5 months agoBrittni
5 months agoAlethea
5 months agoNu
5 months agoOlive
5 months agoChana
6 months agoLauryn
1 year agoKallie
1 year agoTeresita
1 year agoRicki
1 year agoLuis
1 year agoMurray
1 year agoBrandee
1 year agoJess
1 year agoKenneth
1 year agoKanisha
1 year agoClemencia
1 year agoMonroe
1 year agoAudra
1 year agoKatie
1 year agoSerina
2 years agoMammie
2 years ago