Introduction to Mobile Access
Check Point Remote Access Solutions
Getting Started with Mobile Access
Applications for Clientless Access
Single Sign On
Native Applications for Client-Based Access
Exchange Mail Applications for Smartphones and Tablets
Mobile Access for Smartphones and Tablets
User Authentication in Mobile Access
Endpoint Security On Demand
Endpoint Compliance Enforcement
Configuring Endpoint Compliance
Planning the Endpoint Compliance Policy
Using the ICSInfo Tool
Creating Endpoint Compliance Policies
Configuring Endpoint Compliance Settings for Applications and Gateways
Basic Approach: Configuring a Common Policy for the Portal and all Applications
Advanced Approach: Configuring a Threshold Policy for the Portal, Hardened for Specific Applications
Very Advanced Approach: Configuring Individual Policies for Each Application
Configuring Advanced Endpoint Compliance Settings
Configuring Endpoint Compliance Logs
Assign Policies to Gateways and Applications
Excluding a Spyware Signature from a Scan
Preventing an Endpoint Compliance Scan Upon Every Login
Endpoint Compliance Scanner End-User Workflow
Completing the Endpoint Compliance Configuration
Secure Workspace
Endpoint Compliance Updates
Advanced Password Management Settings
Mobile Access Blade Configuration and Settings
Troubleshooting Mobile Access
Mobile Access Commands
Index
|