Use the Suspicious Object Migration Tool to export all Control Manager Suspicious Object lists and import properly formatted suspicious object data to a Check Point server.
To manually migrate individual Control Manager Suspicious Object lists to a Check Point server, you may use the Suspicious Object List Exporter and Check Point SAM Client tools without executing the Suspicious Object Migration Tool.
For more information, see Using the Check Point Suspicious Activity Monitoring Client Tool.
Before using the Suspicious Object Migration Tool, you must:
Prepare the Check Point firewall server
For more information, see Preparing the Check Point Firewall Server.
Prepare the authentication configuration files
For more information, see Preparing the Authentication Certificate Configuration Files.
cd <Control Manager installation directory>\SOTools
The total execution time for the command displays, indicating that the suspicious object data migration is successful.
The Enforced Suspicious Activity Rules screen appears and displays the imported suspicious object data.