External DocumentationTo learn more, visit the Check Point Management documentation.
Parameters
| Parameter | Description |
|---|---|
| Comments | Comments to add to the threat protection object. |
| Details Level | The level of details to include in the response. |
| Follow Up | Select to tag the threat protection object with a follow-up flag. |
| Name | The name of the threat protection object to edit. |
| Object Selector | Choose which attribute (Name or UID) will be used to identify the threat protection object. |
| Overrides | A JSON list of objects to override. For more information refer to the API documentation. |
| Overrides Remove | A comma-separated list of objects to remove from the overrides collection. Note: Remove override for Core protections removes only the action’s override. Remove override for Threat Cloud protections removes the action, track and packet captures. |
| Select Action | The action to perform on the threat protection object. |
| UID | The unique identifier (UID) of the threat protection object to edit. |