UserCheck in the Access Control Policy

When you enable the UserCheck feature, the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. sends messages to users about possible non-compliant behavior or dangerous Internet browsing, based on the rules an administrator configured in the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.. This helps users prevent security incidents and learn about the organizational security policy. Create UserCheck objects and use them in the Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase., to communicate with the users. You can develop an effective policy based on logged user responses.

These Software Blades support the UserCheck feature:

Configuring UserCheck on the Security Gateway

Enable or disable UserCheck directly on the Security Gateway. If users connect to the Security Gateway remotely, set the internal interface of the Security Gateway (on the Topology page) to be the same as the Main URL for the UserCheck Portal.

Creating UserCheck Interaction Objects

UserCheck Interaction objects add flexibility and give the Security Gateway a mechanism to communicate with users.

UserCheck Interaction objects:

  • Help users with decisions that can be dangerous to the organization security.

  • Share the organization's changing internet policy for web applications and sites with users, in real-time.

When UserCheck is enabled, the user's Internet browser shows the UserCheck Interaction messages in a new window.

The UserCheck page contains default UserCheck Interaction messages. You can edit, and preview UserCheck Interaction objects and their messages.

To see the default UserCheck Interaction objects:

In SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., go to Security Policies > Access Control > Access Tools > UserCheck.

You can create additional UserCheck Interaction objects based on your needs.