EasyManua.ls Logo

Check Point HARMONY R81 - Prohibited Applications and Files

Check Point HARMONY R81
451 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Prohibited Applications and Files
R81 Harmony Endpoint Server Administration Guide|367
Prohibited Applications and Files
The Prohibited Applications and Files Action makes sure that files, registry keys, and
processes that must not be on endpoint computers are not present or running. The default
settings show in the Prohibited Application Action Rules.
For Prohibited Application action rules, all check objects must be non-compliant to trigger the
action and Remediation. If only one check object is compliant, the action and Remediation are
not triggered.
See
"Compliance Action Rules" on page360
for more information.

Table of Contents

Related product manuals