The Endpoint Security Management Server has rules in the policy for these security features.
Blade |
Rule |
Description |
---|---|---|
Full Disk Encryption |
User Authentication (OneCheck) |
Manages:
|
Full Disk Encryption |
Full Disk Encryption |
Combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. |
Media Encryption & Port Protection |
Media Encryption & Port Protection |
Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on). |
Anti-Malware |
Anti-Malware |
Protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers. |
Firewall |
Access Zones |
Defines the topology of the organizational network, separating it into Trusted and Internet domains. |
Firewall |
Firewall |
Blocks or allows network traffic based on attributes of network connections. |
Firewall |
Application Control |
Controls network access on a per-application basis, letting you restrict application access by zone and direction. |
Compliance |
Compliance |
Ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer. For example, non-compliance can result in a remediation message, a warning, or restriction from the network. |
VPN |
Remote Access VPN |
Remote Access VPN lets users connect remotely to a Check Point Security Gateway using IPsec. |
Settings for some Software Blades are defined for computers, while others are defined for users.
For example: