Compliance - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Compliance

The Compliance component of Endpoint Security makes sure that endpoint computers comply
with security rules that you define for your organization. Computers that do not comply show
as non-compliant and you can apply restrictive policies to them.
The Compliance component makes sure that:
n
All assigned components are installed and running on the endpoint computer.
n
Anti-Malware is running and that the engine and signature databases are up to date.
n
Required operating system service packs and Windows Server updates are installed on
the endpoint computer.
n
Only authorized programs are installed and running on the endpoint computer.
n
Required registry keys and values are present.
Note - Registry and File Version checks are not relevant for macOS
If an object (for example an OU or user) in the organizational tree violates its assigned policy,
its compliance state changes, and this affects the behavior of the endpoint computer:
n
The compliant state is changed to non-compliant.
n
The event is logged, and you can monitor the status of the computer and its users.
n
Users receive warnings or messages that explain the problem and give a solution.
n
Policy rules for restricted computers apply. See
Restricted Rules" on page 139
"Connected, Disconnected and
.
R81 Harmony Endpoint Server Administration Guide      |      356
Compliance

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF