Application Control

The Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. component of Endpoint Security restricts network access for specified applications. The Endpoint Security administrator defines policies and rules that allow, block or terminate applications and processes. The administrator can also configure that an application is terminated when it tries to access the network, or as soon as the application starts.

This is the workflow for configuring Application Control:

  1. Set up a Windows device with the typical applications used on protected Endpoint computers in your organization. This is your reference device. If you have several different standard images, set up a reference device for each.

  2. Generate the list of applications on the computer by running the Appscan tool. This generates an XML file that contains the details of all the applications on the computer.

  3. Upload the Appscan XML file to the Endpoint Security Management ServerClosed A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data. using Harmony Endpoint.

  4. Configure the action for each application in the Application Control policy. You can configure which applications are allowed, blocked, or terminated.

  5. Install policy.

macOS:

  1. Run the Application Scan Push Operation. See Performing Push Operations.

  2. Configure the action for each application in the Application Control policy. You can configure which applications are allowed, blocked, or terminated.

  3. Install policy.