Introduction to Mobile Access
Check Point Remote Access Solutions
Getting Started with Mobile Access
Applications for Clientless Access
Protection Levels
Web Applications
File Shares
Citrix Services
Web Mail Services
Native Applications
DNS Names
DNS Names and Aliases
Where DNS Name Objects are Used
Defining the DNS Server used by Mobile Access
Configuring DNS Name Objects
Using the Login Name of the Currently Logged in User
Single Sign On
Native Applications for Client-Based Access
Exchange Mail Applications for Smartphones and Tablets
Mobile Access for Smartphones and Tablets
User Authentication in Mobile Access
Endpoint Security On Demand
Advanced Password Management Settings
Mobile Access Blade Configuration and Settings
Troubleshooting Mobile Access
Mobile Access Commands
Index
|