Identity Collector - Configuring as Identity Source

To enable the Identity CollectorClosed Check Point dedicated client agent installed on Windows Servers in your network. Identity Collector collects information about identities and their associated IP addresses, and sends it to the Check Point Security Gateways for identity enforcement. For more information, see sk108235. You can download the Identity Collector package from sk134312. solution, you must configure it in the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Gateway object in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.:

  1. From the left navigation panel, click Gateways & Servers.

  2. Open the Identity Awareness Gateway object.

  3. From the left tree, click the Identity Awareness pane.

  4. Select Identity Collector and click Settings.

  5. In the Identity Collector Settings window, configure these:

  6. Click OK to close the Identity Collector Settings window.

  7. Click OK to close the Check Point Gateway window.

  8. Optional: To enforce the Cisco Security Group Tags (SGTs) on the Identity Awareness Gateway:

    1. In SmartConsole, click the Objects menu > click Object Explorer.

    2. In the Object Explorer, click New > User > User Group.

    3. Name the new group: CSGT-<SGT_NAME>.

    4. Assign this group to an Access RoleClosed Access Role objects let you configure network access according to: Networks, Users and user groups, Computers and computer groups, Remote Access Clients. After you activate the Identity Awareness Software Blade, you can create Access Role objects and use them in the Source and Destination columns of Access Control Policy rules..

  9. Install the Access Control Policy.