Configuring UserCheck
Configuring the Security Gateway for UserCheck
Enable or disable UserCheck directly on the Security Gateway. The Application and URL Filtering tab > Gateways window shows a list of Security Gateways with the Application Control blade enabled.
|
Note - When you enable UserCheck on a Security Gateway that is on an IP Series appliance, make sure to set the Voyager management application port to a port other than 443 or 80.
|
To configure a Security Gateway for UserCheck:
- Select a Security Gateway and click Edit.
The window opens.
- On the UserCheck page, select .
- Enter the information for the UserCheck portal:
- In the field, enter the primary URL for the web portal that shows the UserCheck notifications.
|
Notes -
- If the points to an external interface, the option must be set to one of these:
- If users connect to the Security Gateway remotely, set the Security Gateway internal interface (on the page) to be the same as the for the UserCheck portal.
- In the field, enter the IP address that the URL resolves to.
- Click to add URL aliases that redirect different hostnames to the , for example: Usercheck.mycompany.com. The aliases must be resolved to the portal IP address on the corporate DNS server
|
- In the area, click to import a certificate that the portal uses to authenticate to the server.
By default, the portal uses a certificate from the Check Point Internal Certificate Authority (ICA). This might generate warnings if the user browser does not recognize Check Point as a trusted Certificate Authority. To prevent these warnings, import your own certificate from a recognized external authority.
- In the area, click to configure interfaces on the Security Gateway through which the portal can be accessed. These options are based on the topology configured for the Security Gateway. Users are sent to the UserCheck portal if they connect:
|
Note - If is selected add a Firewall rule that looks like this:
Source
|
Destination
|
VPN
|
Service
|
Action
|
Any
|
Security Gateway on which UserCheck client is enabled
|
Any Traffic
|
UserCheck
|
Accept
|
|
- . Select this option if there is a rule that states who can access the portal.
- Click .
- Install Policy.
|
Note - The Security Gateway has an internal persistence mechanism that preserves UserCheck notification data if the Security Gateway or cluster reboots. Records of a user answering or receiving notifications are never lost.
|
UserCheck CLI
You can use the usrchk command in the gateway command line to show or clear the history of UserCheck objects.
Description
|
usrchk
|
Syntax
|
usrchk [debug] [hits]
|
Parameters
|
Parameter
|
Description
|
debug
|
Controls debug messages
|
hits
|
Shows user incident options:
list - Options to list user incidents
all - List all existing incidents.user <username> - List incidents of a specified user. uci <name of interaction object> - List incidents of a specified UserCheck interaction object
clear - Options to clear user incidents
all - Clear all existing incidentsuser <username> - Clear incidents for a specified useruci <name of interaction object> - Clear incidents of a specified UserCheck interaction object
db - user hits database options
|
|
|
Examples:
- To show all UserCheck interaction objects, run:
usrchk hits list all - To clear the incidents for a specified user, run
: usrchk hits clear user <username>
Notes:
- You can only run a command that contains
user <username> if:- Identity Awareness is enabled on the gateway.
- Identity Awareness is used in the same policy rules as UserCheck objects.
- To run a command that contains a specified UserCheck interaction object, first run
usrchk hits list all to see the names of the interaction objects. Use the name of the interaction object as it is shown in the list.
Revoking Incidents
The Revoke Incidents URL can revoke a user's responses to UserCheck notifications. The URL is:
If users regret their responses to a notification and contact their administrator, the administrator can send users the URL.
After a user goes to the URL, all of the user's responses to notifications are revoked. The logs in SmartView Tracker will show the user's activity, and that the actions were revoked afterwards.
Administrators can use the usrchk command of the CLI to revoke incidents for one user, all users, or a specified interaction object.
|
|