![]() ![]() On gateways of version R71 and higher, a combination of Endpoint Compliance Policy and Secure Workspace Policy can require the following Policy: Any client connecting to the gateway from a machine that is not managed by the organization or that does not meet a specific enforcement policy, must use Check Point Secure Workspace. A policy could also specify that a machine must be managed by the organization in order to gain full access to internal data and applications. A policy can specify, for example, that the endpoint machine must have an approved Anti-Virus application, and that it must be free of spyware. The endpoint compliance policy is made up of rules. If the endpoint is compliant with the endpoint compliance policy, the user is allowed to access the portal.īy ensuring that endpoints comply with a security policy, Endpoint Security On Demand protects enterprises from threats emanating from unsecured endpoint computers that can result in data loss and excessive bandwidth consumption. For example, an endpoint compliance policy can make sure that the endpoint client has updated Anti-Virus software and an active firewall. ![]() ![]() The Check Point Endpoint Security On Demand scanner enforces endpoint compliance by scanning the endpoint to see if it complies with a pre-defined endpoint compliance policy. Endpoint Security On Demand In This Section:Įndpoint Compliance Scanner End-User WorkflowĬompleting the Endpoint Compliance Configuration ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |