Overview Tab
The Overview tab shows a graphical summary of important security information about the endpoint clients in your organization. This tab includes three information panes:
Security Summary for the Organization
This pane shows the total number of endpoints discovered in the organization. The pane also shows the number of endpoints that:
-
Are aligned with the organizational security policy
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.
-
Have security warnings
-
Have security violations
Active Alerts
This pane shows the number of active security alerts in different categories. You can click the View Current Status link for each category to see the endpoints that generated the alerts. The alert list updates every ten minutes.
You can enable/disable alerts, configure alert thresholds and configure email notifications in Reporting tab > Alerts. See Alerts.
Security Status
This pane shows a chart of different security status categories, including:
-
Deployment Progress - Shows the progress of package deployment to endpoint computers.
-
Blade Health Check - Shows which computers have installed components that are not running.
-
Disk Encryption Status - Shows the status of Full Disk Encryption
A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. on endpoint computers.
-
Anti-Malware Updates - Shows which endpoint computers have or are lacking current Anti-Malware
A component on Endpoint Security Windows clients. This component protects clients from known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers. signature updates.
-
Malware Infections - Shows which endpoint computers are malware-free, have not been scanned, or have malware problems.
-
Compliance Verification - Shows which endpoint computers are compliant with the security policy and which are restricted or have pending warnings.
-
Bot Detections - Shows which endpoint computers have bot problems.
For each category you can see:
-
Trend tab - A line chart that shows the trend over time.
-
Endpoints tab - A table that shows Endpoint computers in greater detail.
You can also click the Getting Started link to run the Endpoint Security Express Setup Wizard. Do the steps in the wizard pages to quickly configure the default policy for each component. The wizard also lets you run the Active Directory Scanner and configure Uploading Client Packages to the Repository.
Opening SmartEndpoint
You can open SmartEndpoint A Check Point GUI application which connects to the Endpoint Security Management Server, to manage your Endpoint Security environment - to deploy, monitor and configure Endpoint Security clients and policies. in these ways:
-
Go to Start > All Programs > Check Point SmartConsole <Version> > SmartEndpoint <Version>.
-
Open SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., and from the Menu, select SmartEndpoint.
Policy Tab
You define and manage the policy for each Endpoint Security component in the Policy tab.
The policy tab contains the Policy Management Toolbar and the Policy Rule Base.