

An endpoint computer is compliant if it meets one of the rules in the group.īy default, Endpoint Security on Demand only allows endpoint computers that are compliant with the compliance policy log in to the Mobile Access Portal. rules for your organization, for example: applications, files, and registry keys. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. Spyware scan - Action that is done for different types of spyware.Ĭustom - Compliance Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. protection - Anti-Virus software version and virus signature files. Windows security - Microsoft Windows hotfixes, patches and Service Packs.Īnti-Spyware protection - Anti-Spyware software.Īnti-Virus Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. These are the rules for a compliance policy: You can configure the security and compliance settings for each rule Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. The compliance policy is composed of different types of rules. The scan starts when the Internet browser tries to open the Mobile Access Portal.

The compliance scanner is installed on mobile devices and computers with ActiveX (for Internet Explorer on Windows) or Java.

Mobile devices and computers are scanned one time to make sure that they are compliant before they can connect to the network. lets you use the Endpoint Security on Demand feature to create compliance policies and add more security to the network. Software Blade Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. The Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients.
