Print Download PDF Send Feedback

Previous

Next

Overview of the System Architecture

An Endpoint Security environment includes SmartEndpoint, Endpoint Security Management Server, and Endpoint Security clients. It is integrated with the Check Point Security Management and SmartConsole.

Endpoint Security Management Server

Item

Description

SmartEndpoint

Check Point SmartConsole application to deploy, monitor and configure Endpoint Security clients and policies. Install on the Endpoint Security Management Server or on a computer that supports the client installation.

Endpoint Security Management Server

Software Blade on Security Management Server with Endpoint Security policy management and databases. It communicates with endpoint clients to update their policies and protection data.

Endpoint Security Blades

Software blades available on the Endpoint Security Management Server. You can install any or all of these blades on endpoint clients. See Software Blades.

Endpoint Security Database

Holds policies that enforce security on endpoint clients, holds user and computer objects, licensing, and Endpoint monitoring data.

Directory Scanner

Software component that synchronizes the structure and contents of the Active Directory with the Endpoint Security policy database.

Endpoint Security Clients

Item

Description

Endpoint Security Clients

Application installed on end-user computers to monitor security status and enforce security policies.

Endpoint Agent

Endpoint Security software on client computers. It operates as a container for Software Blades deployed on the endpoint client and communicates with the Endpoint Security Management Server. (Endpoint Agent is also known as the Device Agent or DA)

Endpoint Security Blades

Software blades deployed on the endpoint client.

Note - When the term Endpoint Security Management Server is used, it refers to all Endpoint Security Servers in the environment. This includes Endpoint Security Management Servers or Endpoint Policy Servers.

Related Topics

Optional System Components

Optional System Components

To make sure that your Endpoint Security system runs efficiently and without unnecessary down time, you can also include these components in your system architecture: