UserCheck in the Threat Prevention Policy

This section describes how to configure and use UserCheckClosed Functionality in your Security Gateway or Cluster and endpoint clients that gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy..

Watch the Video

When you enable the UserCheck feature, the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. sends messages to users about possible non-compliant behavior or dangerous Internet browsing, based on the rules an administrator configured in the Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.. This helps users prevent security incidents and learn about the organizational security policy. You can develop an effective policy based on logged user responses. Create UserCheck objects and use them in the Rule BaseClosed All rules configured in a given Security Policy. Synonym: Rulebase., to communicate with the users.

These Software Blades support the UserCheck feature:

Getting Started with UserCheck for Threat Prevention Software Blades:

  1. In the Security Gateway / ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. object:

    1. Enable the applicable Threat Prevention Software Blades.

    2. Configure the applicable UserCheck settings.

      See Configuring UserCheck.

    3. Optional: Download the UserCheck Client and install it on endpoint computers.

      See the R82 Quantum Security Gateway Guide > Chapter "UserCheck Client".

  2. Optional: In the Global Properties, configure the applicable UserCheck settings.

  3. Configure the applicable UserCheck Interaction Objects.

    See UserCheck Interaction Objects for Threat Prevention Software Blades.

  4. Configure the applicable Threat Prevention Profiles and Threat Prevention Policy.

    See:

    In Threat Prevention Profiles > click the applicable Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. page > in the section UserCheck Settings, click the applicable field Prevent or Ask > select the required UserCheck Interaction object.

  5. Install the Threat Prevention Policy on the Security Gateway / Cluster object.

  6. Additional Configuration: