EasyManua.ls Logo

Check Point HARMONY R81 - Application Control

Check Point HARMONY R81
451 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Monitoring Compliance States
R81 Harmony Endpoint Server Administration Guide|372
Application Control
The Application Control component of Endpoint Security restricts network access for specified
applications. The Endpoint Security administrator defines policies and rules that allow, block
or terminate applications and processes. The administrator can also configure that an
application will be terminated when it tries to access the network, or as soon as the application
starts. .
You can also enable the Reputation Service (previously called the Program Advisor).The
Reputation Service recommends whether to approve or not approve an application, and the
Endpoint Security client uses that recommendation , together with the permission setting for
that application in the Application Control policy to decide whether to Allow or block the
application.
This is the workflow for configuring Application Control:
1. Set up a Windows computer with the typical applications used on protected endpoint
computers in your organization. This is your reference computer. If you have several
different standard images, set up a reference computer for each.
2. Generate the list of applications on the computer by running the Appscan tool. This
generates an XMLfile that contains the details of all the applications on the computer.
3. Import the Appscan XML file to the Endpoint Security Management Server using
SmartEndpoint.
4. Configure how the Application Control policy handles applications that are imported from
the Appscan XML file. By default, the applications are allowed.
5. Optional:In the Application Control Policy, review the permission that was automatically
configured for each application and application version. You can configure which
applications are allowed, blocked, or terminated.
6. Optional:Enable the Reputation Service. This is an online service that recommends
whether to approve or not approve an application. The Endpoint Security client uses the
recommendation of the Reputation Service, together with the permission setting for that
application in the Application Control policy to decide whether to Allow or Block the
application.
7. Install the Application Control policy.

Table of Contents

Related product manuals