An Endpoint Security environment includes SmartEndpoint, Endpoint Security Management Server, and Endpoint Security clients. It is integrated with the Check Point Security Management and SmartConsole.
Endpoint Security Management Server
| Item | Description | 
| SmartEndpoint | Check Point SmartConsole application to deploy, monitor and configure Endpoint Security clients and policies. Install on the Endpoint Security Management Server or on a computer that supports the client installation. | 
| Endpoint Security Management Server | Software Blade on Security Management Server with Endpoint Security policy management and databases. It communicates with endpoint clients to update their policies and protection data. | 
| Endpoint Security Blades | Software blades available on the Endpoint Security Management Server. You can install any or all of these blades on endpoint clients. See Software Blades. | 
| Endpoint Security Database | Holds policies that enforce security on endpoint clients, holds user and computer objects, licensing, and Endpoint monitoring data. | 
| Directory Scanner | Software component that synchronizes the structure and contents of the Active Directory with the Endpoint Security policy database. | 
Endpoint Security Clients
| Item | Description | ||
|---|---|---|---|
| Endpoint Security Clients | Application installed on end-user computers to monitor security status and enforce security policies. | ||
| Endpoint Agent | Endpoint Security software on client computers. It operates as a container for Software Blades deployed on the endpoint client and communicates with the Endpoint Security Management Server. (Endpoint Agent is also known as the Device Agent or DA) | ||
| Endpoint Security Blades | Software blades deployed on the endpoint client. | ||
| 
 | Note - When the term Endpoint Security Management Server is used, it refers to all Endpoint Security Servers in the environment. This includes Endpoint Security Management Servers or Endpoint Policy Servers. | ||
| Related Topics | 
To make sure that your Endpoint Security system runs efficiently and without unnecessary down time, you can also include these components in your system architecture: