Make sure smartphone and tablet users are included in your Mobile Access Policy.Ĭertificate Authentication for Handheld Devicesįor handheld devices to connect to the Security Gateway, these certificates must be properly configured: Make sure users' Mobile Settings meet your organization's needs (see the "Managing Mobile Settings" section). Make sure users have the information and credentials required to authenticate to the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.įor client certificates, use the Certificate Creation and Distribution Wizard (see the "Creating Client Certificates" section). Wizard.Ĭonfigure Web applications, if necessary. This can be done automatically in the Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. To manage your users and their access to resources, make sure to:įor email, calendar, and contact access, configure Mobile Mail or ActiveSync applications. Mobile Access for Smartphones and Tablets Overview of Mobile Access for Smartphones and Tablets
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |