Access and Custom Policy Tools

The Access Tools section in the Security Policies Access Control view and the Custom Policy Tools section in the Security Policies Threat Prevention view give you more management and data collection tools.

"Access Tools" in the Security Policies "Access Control" view

Tool

Description

VPN Communities

Create, edit, or delete VPN Communities.

Updates

Update the Application & URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. database, schedule updates, and configure updates.

UserCheck

Configure UserCheck interaction objects for Access Control policy actions.

Client Certificates

Create and distribute client certificates that allow users to authenticate to the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. from handheld devices.

Application Wiki

Browse to the Check Point AppWiki. Search and filter the Web 2.0 Applications Database, to use Check Point security research in your policy rules for actions on applications, apps, and widgets.

Installation History

See the Policy installation history for each Security Gateway, and who made the changes. See the revisions that were made during each installation, and who made them. Install a specific version of the Policy.

"Custom Policy Tools" in the Security Policies "Threat Prevention" view

Tool

Description

Profiles

Create, edit, or delete profiles.

IPS Protections

Edit IPSClosed Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System). protections per profile.

Protections

See statistics on different protections.

Whitelist Files

Configure Whitelist Files list.

Indicators

Configure indicators of malicious activity and how to handle it.

Updates

Configure updates to the Malware database, Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. engine and images, and the IPS database.

UserCheck

Configure UserCheck interaction objects for Threat Prevention policy actions.

Threat Wiki

Browse to the Check Point ThreatWiki. Search and filter Check Point's Malware Database, to use Check Point security research to block malware before it enters your environment, and to best respond if it does get in.

Installation History

See the Policy installation history for each Security Gateway, and who made the changes. See the revisions that were made during each installation, and who made them. Install a specific version of the Policy.