In This Section: |
The Application Control blade restricts network access for specified applications. The Endpoint Security administrator defines policies and rules that allow, block or terminate applications and processes. Only applications that try to get network access can be blocked or terminated. If specified in an Application Control rule, an alert shows which application was blocked or terminated.
You can also enable the Reputation Service (previously called the Program Advisor) to recommend applications to allow or block.
Configure which applications are allowed, blocked, or terminated and what happens when applications are not identified.
To configure the allowed applications:
To configure the blocked applications:
To configure terminated applications:
If you block unidentified applications, users can only access applications that are included in the Allowed Apps List. If you allow unidentified applications, users can access all applications that are not on the blocked or terminated list. If you choose to allow unidentified traffic, make sure your blocked and terminated lists are complete.
To configure what happens to unidentified applications:
In the Policy tab > Application Control rule, select Block Unidentified Applications, or right click and select Allow Unidentified applications.
Terminated applications are not allowed to pass through the firewall.
The Check Point Reputation Service is an online service that automatically creates recommended rules that block or allow common applications. These rules are based on the recommendations of Check Point security experts. This feature reduces your workload while improving security and usability.
Note - Your Endpoint Security Management Server must have Internet access (on ports 80 and 443) to connect to the Check Point Reputation Service Server. Make sure that your firewall allows this traffic. We recommend that you add the Reputation Service Server to your Trusted Zone. |
To see the recommendations of the Reputation Service for safe applications:
A list of applications with a good reputation, generated by the Reputation Service, opens. You can move applications to the Block or Terminate list.
To see the recommendations of the Reputation Service for malicious applications:
A list of malicious applications, generated by the Reputation Service, opens. You can move applications to the Block or Allow list.