UserCheck Client

The UserCheckClosed Functionality in your Security Gateway or Cluster and endpoint clients that gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy. Client is installed on endpoint computers to communicate with the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. and show notifications to users.

UserCheck Client sends notifications for applications that are not in a web browser, such as Skype, iTunes, or browser add-ons (such as radio toolbars). The UserCheck Client can also work together with the UserCheck Portal to show notifications on the computer itself in these cases:

  • It is not possible to show the notification in a web browser.

  • The UserCheck engine determines that the notification does not appear correctly in the web browser.

Notifications of incidents are shown in a pop up from the UserCheck Client in the system tray.

Users select an option in the notification message to respond in real-time.

UserCheck Client Requirements

See the R81 Release Notes > UserCheck Client Requirements.

Workflow for installing and configuring UserCheck Clients:

  1. Open the Security Gateway object.

  2. Enable UserCheck and the UserCheck Client in the Security Gateway object. See UserCheck in the Access Control Policy.

  3. Configure how the UserCheck Clients communicate with the Security Gateway and create trust with it.

    See Client and Gateway Communication.

  4. Install the UserCheck Client on the endpoint computers.

    See Installing UserCheck Client.

  5. Connect the UserCheck Client to the Security Gateway.

    See Connecting UserCheck Client to the Security Gateway.

  6. Make sure the UserCheck Clients can receive notifications.

    Perform a simplest action on the endpoint computers that violates the configured Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection..