Working with User Awareness

In the User Awareness page you can turn the blade on or off and use the configuration wizard to configure sources to get user identities for logging and configuration purposes.

User AwarenessClosed A Check Point software blade designed to associate users to IP addresses for logging and control purposes. lets you configure the Quantum Spark Appliance to show user based logs instead of IP address based logs and enforce access control for individual users and user groups.

Workflow

  1. Turn on the User Awareness Software Blade.

  2. Click the Configuration wizard to enable and configure the blade.

  3. Select the identification methods to get information about users and user groups and configure the identity sources.

  4. After initial configuration, you can select the Active Directory Queries, Browser-Based Authentication, or Identity Collector checkboxes in the Policy Configuration section and click Configure for more advanced settings.

  5. After the gateway acquires the identity of a user, you can enforce user-based rules on the network traffic in the Access Policy.

Identity Sources

User Awareness can use these sources to identify users:

  • AD Query (Active Directory Queries) - Seamlessly queries the Active Directory servers to get user information.

    The Quantum Spark Appliance registers to receive security event logs from the AD domain controllers when the security policy is installed. This requires administrator privileges for the AD server. When a user authenticates with AD credentials, these event logs are generated and are sent to the Security GatewayClosed A dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. The Quantum Spark Appliance can then identify the user based on the AD security event log.

  • Browser-Based Authentication - Uses a portal to authenticate either locally defined users or as a backup to other identification methods.

    • Browser-Based Authentication uses a web interface to authenticate users before they can access network resources or the Internet. When users try to access a protected resource, they must log in to a web page to continue. This identifies locally defined users or users that were not successfully identified by other methods.

    • You can configure the Browser-Based Authentication to appear for all traffic. This identification method is commonly configured to appear when you access only specific network resources or the Internet to avoid the overhead required from end users when they identify themselves.

    • For traffic that is not HTTP based, you can also configure that all unidentified users are blocked from accessing the configured resources or Internet until they identify themselves first through the Browser-Based Authentication.

  • Identity Collector - Collects information about identities and their associated IP addresses and sends it to the Security Gateway for identity enforcement.

    Note - In the R81.10.X releases, this feature is available starting from the R81.10.05 version.

Enabling User Awareness

  1. Select the On or Off option.

    Note - When the blade is managed by Cloud Services, a lock icon is shown. You cannot toggle between the on and off states. If you change other policy settings, the change is temporary. Any changes made locally are overridden in the next synchronization between the gateway and Cloud Services.

  2. Click the Configuration wizard link.

    The User Awareness Wizard opens.

  3. Select one or more user identification methods and click Next.

  4. Follow the rest of the steps and click Finish.

  5. After initial configuration, you can select the Active Directory Queries or Browser-Based Authentication checkboxes under Policy Configuration and click Configure to configure more advanced settings.

Active Directory Queries:

If you have an existing Active Directory server, click Use existing Active Directory servers.

Browser-Based Authentication

Identity Collector

Note - In the R81.10.X releases, this feature is available starting from the R81.10.05 version.

Quantum Spark Locally Managed appliances support Identity Collector as an Identity Source in versions R81.10.05 and higher.

For more information about Identity Collector configuration, see Identity Awareness Clients Administration Guide.

Note - This page is available from Access Policy > User Awareness Blade Control and Users & Objects > User Awareness.