Print Download PDF Send Feedback

Previous

Next

Software Blades

The Endpoint Security Management Server has rules in the policy for these security features.

Blade

Rule

Description

Full Disk Encryption

User Authentication (OneCheck)

Manages:

  • How a Full Disk Encryption user logs in to the computer
  • How failed logins are handled
  • Password security
  • Access to remote help.

Full Disk Encryption

Full Disk Encryption

Combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops.

Media Encryption & Port Protection

Media Encryption & Port Protection

Protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on).

Anti-Malware

Anti-Malware

Protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers.

Firewall

Access Zones

Defines the topology of the organizational network, separating it into Trusted and Internet domains.

Firewall

Firewall

Blocks or allows network traffic based on attributes of network connections.

Firewall

Application Control

Controls network access on a per-application basis, letting you restrict application access by zone and direction.

Compliance

Compliance

Ensures that protected computers comply with your organization's requirements and allows you to assign different security levels according to the compliance state of the endpoint computer. For example, non-compliance can result in a remediation message, a warning, or restriction from the network.

VPN

Remote Access VPN

Remote Access VPN lets users connect remotely to a Check Point Security Gateway using IPsec.

Settings for some Software Blades are defined for computers, while others are defined for users.

For example: