 Introduction to Mobile Access
 Check Point Remote Access Solutions
 Getting Started with Mobile Access
 Applications for Clientless Access
 Single Sign On
 Native Applications for Client-Based Access
 Exchange Mail Applications for Smartphones and Tablets
 Mobile Access for Smartphones and Tablets
 User Authentication in Mobile Access
 Endpoint Security On Demand
 Endpoint Compliance Enforcement
 Configuring Endpoint Compliance
 Planning the Endpoint Compliance Policy
 Using the ICSInfo Tool
 Creating Endpoint Compliance Policies
 Configuring Endpoint Compliance Settings for Applications and Gateways
 Basic Approach: Configuring a Common Policy for the Portal and all Applications
 Advanced Approach: Configuring a Threshold Policy for the Portal, Hardened for Specific Applications
 Very Advanced Approach: Configuring Individual Policies for Each Application
 Configuring Advanced Endpoint Compliance Settings
 Configuring Endpoint Compliance Logs
 Assign Policies to Gateways and Applications
 Excluding a Spyware Signature from a Scan
 Preventing an Endpoint Compliance Scan Upon Every Login
 Endpoint Compliance Scanner End-User Workflow
 Completing the Endpoint Compliance Configuration
 Secure Workspace
 Endpoint Compliance Updates
 Advanced Password Management Settings
 Mobile Access Blade Configuration and Settings
 Troubleshooting Mobile Access
 Mobile Access Commands
 Index
|