Contents

 
 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
Expand Terms
 Welcome
Expand Getting Started
Expand Managing Administrator Accounts
Expand Managing Gateways
Expand Managing Objects
Expand Managing Policies
Expand Creating an Access Control Policy
Expand Creating a Threat Prevention Policy
Collapse Managing User Accounts
   Expand Authentication Methods for Users and Administrators
   Expand Configuring Authentication Methods for Users
   Expand User Database
   Expand Managing User Groups
   Collapse LDAP and User Directory
       User Directory and Identity Awareness
       User Directory Considerations
       The User Directory Schema
      Collapse Check Point Schema for LDAP
          Schema Checking
          OID Proprietary Attributes
         Expand User Directory Schema Attributes
          Netscape LDAP Schema
      Expand User Directory Profiles
      Expand Microsoft Active Directory
      Expand Retrieving Information from a User Directory Server
       Deploying User Directory
       Enabling User Directory
      Expand Account Units
      Expand Managing Users on a User Directory Server
   Expand Access Roles
    Authentication Rules
Expand Client Certificates for Smartphones and Tablets
Expand Preferences and Management Settings
Expand Management High Availability
Expand The ICA Management Tool
Expand Command Line Reference