Access and Custom Policy Tools
The Access Tools section in the Security Policies Access Control view and the Custom Policy Tools section in the Security Policies Threat Prevention view give you more management and data collection tools.
"Access Tools" in the Security Policies "Access Control" view
Tool |
Description |
---|---|
VPN Communities |
Create, edit, or delete VPN Communities. |
Updates |
Update the Application & URL Filtering |
UserCheck |
Configure UserCheck interaction objects for Access Control policy actions. |
Client Certificates |
Create and distribute client certificates that allow users to authenticate to the Security Gateway |
Application Wiki |
Browse to the Check Point AppWiki. Search and filter the Web 2.0 Applications Database, to use Check Point security research in your policy rules for actions on applications, apps, and widgets. |
Installation History |
See the Policy installation history for each Security Gateway, and who made the changes. See the revisions that were made during each installation, and who made them. Install a specific version of the Policy. |
"Custom Policy Tools" in the Security Policies "Threat Prevention" view
Tool |
Description |
---|---|
Profiles |
Create, edit, or delete profiles. |
IPS Protections |
Edit IPS |
Protections |
See statistics on different protections. |
Whitelist Files |
Configure Whitelist Files list. |
Indicators |
Configure indicators of malicious activity and how to handle it. |
Updates |
Configure updates to the Malware database, Threat Emulation |
UserCheck |
Configure UserCheck interaction objects for Threat Prevention policy actions. |
Threat Wiki |
Browse to the Check Point ThreatWiki. Search and filter Check Point's Malware Database, to use Check Point security research to block malware before it enters your environment, and to best respond if it does get in. |
Installation History |
See the Policy installation history for each Security Gateway, and who made the changes. See the revisions that were made during each installation, and who made them. Install a specific version of the Policy. |