Protection Levels for Native Applications
You can define a protection level for each native application. Configure this in the Properties window of each native application in Additional Settings > Protection Level.
The options are:
-
This application relies on the security requirements of the gateway
Rely on the Security GatewayDedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. security requirements. Users authorized to use the portal are also authorized to use this application. This is the default option.
-
This application has additional security requirements specific to the following protection level
Associate the Protection Level with the application. Users must be compliant with the security requirement for this application in addition to the requirements for the portal.
Defining Protection Levels

-
In SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., select Security Policies > Shared Policies > Mobile Access and click Open Mobile Access Policy in SmartDashboard.
SmartDashboard
Legacy Check Point GUI client used to create and manage the security settings in versions R77.30 and lower. In versions R80.X and higher is still used to configure specific legacy settings. opens and shows the Mobile Access tab.
-
From the navigation tree click Additional Settings > Protection Levels page from the navigation tree.
-
Click New to create a new Protection Level or double-click an existing Protection Level to modify it.
The Protection Levels window opens, and shows the General Properties page.

-
In SmartConsole, click Objects > Object Explorer (Ctrl+E).
-
Search for the Mobile Access
Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Acronym: MAB. application.
-
Double-click the application.
-
From the navigation tree, select Additional Setting > Protection Level.
-
To create a new Protection Level, select Manage > New.
-
To edit the settings of a Protection Level, select the Protection Level from the drop down list and then select Manage > Details.
The Protection Levels window opens, and shows the General Properties page.

-
From the General Properties page in the Protection Level window, enter the Name for the Protection Level (for a new Protection Level only).
-
In the navigation tree, click Authentication and select one or more authentication methods from the available choices. Users accessing an application with this Protection Level must use one of the selected authentication schemes.
-
If necessary, select User must successfully authenticate via SMS.
-
In the navigation tree, click Endpoint Security and select one or both of these options:
-
Applications using this Protection Level can only be accessed if the endpoint machine complies with the following Endpoint compliance policy. Also, select a policy. This option gives access to the associated application only if the scanned client computer complies with the selected policy.
-
Applications using this Protection Level can only be accesses from within Secure Workspace. This option requires Secure Workspace to be running on the client computer.
-
-
Click OK to close the Protection Level window.
-
Install the Access Control Policy.