Course Contents

Check Point Integrity Integrity Architecture:

  • Integrity Overview.
  • Integrity Architecture.
  • Web-based Management.
  • Management-Server Platform.
  • Administrator Role Assignments.
  • Integrity Licensing.
  • Integrity Administrator Console.
  • Integrity Client.
  • The Control Center.
  • Integrity Advanced Server Installation Process.
  • Synchronizing User Catalogs.
  • Installing Integrity Advanced Server.
  • Integrity Client Executable.
  • Auto-Updating a Client Package.

Policy Management:

  • Integrity Security Policies.
  • Enterprise Policies.
  • Personal Policy.
  • The Default Policy.
  • Policy Arbitration.
  • Policy Rules Overview.
  • Classic Firewall Rules.
  • Zone Rules and Program Rules.
  • Enforcement Rules.
  • Rule Evaluation and Precedence.
  • How Traffic Is Evaluated.
  • Policy Creation.
  • Preconfigured Policy Templates.

Enterprise Policies:

  • Understanding Firewall Rules.
  • Zone Rules.
  • Defining Zones.
  • How Zone Rules Work.
  • Workflow for Zone-Based Security.
  • Managing Access Zones.
  • Configuring the Trusted Zone.
  • Choosing Security Levels.
  • Program Control.
  • Understanding Program Control.
  • Workflow for Program Control.
  • Observing Program Activity.
  • Creating Program Rules.
  • Program Rule Types.
  • Program Permissions.
  • SmartDefense Program Advisor.
  • SmartDefense Program Advisor Process.
  • Integrity Advanced Server Program Advisor Process.

Non-secure Endpoints:

  • Understanding Enforcement Rules.
  • Cooperative Enforcement.
  • What the Restricted User Experiences.
  • Enforcement-Rule Workflow.
  • How Enforcement Rules Work.

Content Inspection:

  • Anti-Spyware.
  • Understanding Integrity.

Anti-Spyware:

  • Configuring Anti-Spyware.
  • Understanding Outbound Protection.
  • Enforcing Anti-Spyware Scans and Treatments.
  • Anti-Spyware Updates.
  • Preventing E-mail Attacks.
  • Setting Up Regular Anti-Spyware Scans.
  • Understanding Inbound e-mail Protection.
  • What the User Experiences.
  • Limitations of Mail Safe e-mail Protection.
  • Protecting Instant Messaging.

Monitoring Client Security:

  • Monitoring Integrity Endpoint Security.
  • Overview of Endpoint Connectivity.
  • Tracking Enforcement-Rule Compliance.
  • Current Client Compliance Status Report.
  • Tracking Client-Security Events.
  • Tracking and Observing Programs.