Rule Types for Each Endpoint Security Component
The table shows if the policy for each Endpoint Security component is enforced for each user or for each computer (the Rule Type).
The table also shows that you can define a Connected policy for all components. For some components you can also define Disconnected and Restricted policies.
|
Note - Deployment Rules are defined for computers, not for users. |
Component |
Rule Type |
Connected |
Disconnected |
Restricted |
---|---|---|---|---|
Computer |
|
|
|
|
User |
|
|
|
|
OneCheck OneCheck settings define how users authenticate to Endpoint Security client computers. User Settings |
User |
|
|
|
User |
|
|
|
|
User |
|
|
|
|
SandBlast Agent Anti-Ransomware, Behavioral Guard and Forensics |
Computer |
|
|
|
User |
|
|
|
|
SandBlast Agent Threat Extraction Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX., Emulation and Anti-Exploit |
User |
|
|
|
User |
|
|
|
|
Computer |
|
|
|
|
Firewall |
User |
|
|
|
Access Zones |
User |
|
|
|
User |
|
|
|
|
Client Settings |
User |
|
|
|