Policy Operation

The new policy operation mode allows greater flexibility to the user by proving him with a choice of capability ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. applicability. While under the old policy calculation the rule type of each capability determined whether the capability can work on user or computer, under the new policy the user has the ability to define for himself which method he wants the capability to work in (except in cases where it only makes sense for the capability to apply to users or computers, but not both).

In this new operation mode, most capabilities are "mixed", which means they can function per users or computers, according to the user’s choice. In each capability, the rules are ordered both by their assigned environment, from the specific down to the general, as well as by user/computer applicability: the first rule applies to the users, and if no match is found, the following rules apply to computers/devices as well.

To view the Policy Operations Mode page, click Endpoint Settings > Policy Operations Mode.

Old Policy Calculation Mode

Component

Rule Type

Full Disk EncryptionClosed A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. Computer only
Media Encryption & Port ProtectionClosed A component on Endpoint Security Windows clients. This component protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on). Acronym. MEPP. Computer (default) / User
Onecheck User only
Anti-MalwareClosed A component on Endpoint Security Windows clients. This component protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers. Computer (default) / User
Anti-Ransomware, Behavioral Guard & Forensics Computer only
Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. & URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. Computer (default) / User

Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE., Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX. & Anti-Exploit

Computer (default) / User

ComplianceClosed Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration.

Computer (default) / User

Firewall

Computer (default) / User

Access Zones

Computer (default) / User

Application ControlClosed Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI.

Computer (default) / User

Client Settings

Computer (default) / User

.