Identity Awareness Software Blade
Traditionally, firewalls use IP addresses to monitor traffic, and are unaware of the user and computer identities behind IP addresses. Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. maps users and computer identities. This lets you enforce Access Control policy rules and audit data based on identity.
Identity Awareness is an easy to deploy and scalable solution. It works for both Active Directory and non-Active Directory based networks, and also for employees and guest users.
Identity Awareness uses the Source and Destination IP addresses of network traffic to identify users and computers.
You can use these elements as matching criteria in the Source
and Destination
fields of the Access Control policy rules:
-
The identity of users or user groups
-
The identity of computers or computer groups
With Identity Awareness, you define policy rules for specified users, who send traffic from specified computers or from any computer. Likewise, you can create policy rules for any user on specified computers.
Identity Awareness gets identities from the configured identity sources.
For more information, see: