Introduction to Mobile Access
Check Point Remote Access Solutions
Getting Started with Mobile Access
Applications for Clientless Access
Single Sign On
Native Applications for Client-Based Access
Exchange Mail Applications for Smartphones and Tablets
Mobile Access for Smartphones and Tablets
User Authentication in Mobile Access
Endpoint Security On Demand
Endpoint Compliance Enforcement
Configuring Endpoint Compliance
Endpoint Compliance Scanner End-User Workflow
Completing the Endpoint Compliance Configuration
Secure Workspace
Enabling Secure Workspace
Applications Permitted by Secure Workspace
SSL Network Extender in Secure Workspace
Secure Workspace Policy Overview
Configuring the Secure Workspace Policy
Secure Workspace End-User Experience
Disabling Internet Explorer Protected Mode
Logging on to the Mobile Access Portal Using Secure Workspace
Working with the Secure Workspace Virtual Desktop
Start Menu and Taskbar
Allowing Users to Save Files to the "Real" Desktop
Accessing Files and Applications on the Endpoint Computer
Accessing Endpoint Applications in Secure Workspace
Switching Between Secure Workspace and the "Real" Desktop
Exiting Secure Workspace
Troubleshooting Secure Workspace
Endpoint Compliance Updates
Advanced Password Management Settings
Mobile Access Blade Configuration and Settings
Troubleshooting Mobile Access
Mobile Access Commands
Index
|