 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
 Terms
 Welcome
 Getting Started
 Managing Administrator Accounts
 Managing Gateways
 Managing Objects
 Managing Policies
 Creating an Access Control Policy
 Creating a Threat Prevention Policy
 Managing User Accounts
 Authentication Methods for Users and Administrators
 Configuring Authentication Methods for Users
 User Database
 Managing User Groups
 LDAP and User Directory
 User Directory and Identity Awareness
 User Directory Considerations
 The User Directory Schema
 Check Point Schema for LDAP
 User Directory Profiles
 Default User Directory Profiles
 Modifying User Directory Profiles
 Fetch User Information Effectively
 Setting User-to-Group Membership Mode
 Profile Attributes
 Microsoft Active Directory
 Retrieving Information from a User Directory Server
 Deploying User Directory
 Enabling User Directory
 Account Units
 Managing Users on a User Directory Server
 Access Roles
 Authentication Rules
 Client Certificates for Smartphones and Tablets
 Preferences and Management Settings
 Management High Availability
 The ICA Management Tool
 Command Line Reference
|