Contents

 
 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
Expand Terms
 Welcome
Expand Getting Started
Expand Managing Administrator Accounts
Expand Managing Gateways
Expand Managing Objects
Expand Managing Policies
Expand Creating an Access Control Policy
Expand Creating a Threat Prevention Policy
Collapse Managing User Accounts
   Expand Authentication Methods for Users and Administrators
   Expand Configuring Authentication Methods for Users
   Expand User Database
   Expand Managing User Groups
   Collapse LDAP and User Directory
       User Directory and Identity Awareness
       User Directory Considerations
       The User Directory Schema
      Expand Check Point Schema for LDAP
      Expand User Directory Profiles
      Expand Microsoft Active Directory
      Expand Retrieving Information from a User Directory Server
       Deploying User Directory
       Enabling User Directory
      Collapse Account Units
         Expand Working with LDAP Account Units
          Modifying the LDAP Server
          Account Units and High Availability
          Setting High Availability Priority
          Authenticating with Certificates
      Expand Managing Users on a User Directory Server
   Expand Access Roles
    Authentication Rules
Expand Client Certificates for Smartphones and Tablets
Expand Preferences and Management Settings
Expand Management High Availability
Expand The ICA Management Tool
Expand Command Line Reference