<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Web Conference Applications - Understand what your users are doing in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Conference-Applications-Understand-what-your-users-are-doing/m-p/85688#M11093</link>
    <description>&lt;P&gt;Hey all,&lt;/P&gt;
&lt;P&gt;A major result of the current COVID-19 pandemic is the significant increase in the use of video conferencing applications. Applications like Zoom, BlueJeans, and Microsoft Teams have become critical to our ability to communicate effectively, both for work continuity, and for keeping up with friends and family in these days of social distancing and sheltering in place.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In&lt;SPAN&gt;&amp;nbsp;the new released package of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.checkpoint.com/products/application-control/" target="_blank" rel="noopener"&gt;Application Control&lt;/A&gt;, the video conference apps detection is focused on 4 major components:&amp;nbsp; Basic Discovery (App Identification &amp;amp; Monitoring), File Transfer (Uploads &amp;amp; Downloads), Remote Control and Desktop Sharing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="conf3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6146i68D8B691F161C93A/image-size/large?v=v2&amp;amp;px=999" role="button" title="conf3.png" alt="conf3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;General page in a dedicated SmartView report (can be downloaded from Check Point blog - link below)&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Conf.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6143i0630842D581AC770/image-size/large?v=v2&amp;amp;px=999" role="button" title="Conf.png" alt="Conf.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Rule Base granularity - Drop 'Zoom-Download' action for the users in the network:&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="conf2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6145i5A3E7FB21B915F98/image-size/large?v=v2&amp;amp;px=999" role="button" title="conf2.png" alt="conf2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;you can review the full blog and best practices (include download the relevant SmartView report) in the following Check Point blog.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2020/05/18/adaptation-is-the-best-practice-leveraging-application-control-in-the-days-of-video-conferencing/" target="_blank" rel="noopener"&gt;https://blog.checkpoint.com/2020/05/18/adaptation-is-the-best-practice-leveraging-application-control-in-the-days-of-video-conferencing/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;for any comment, input or question - please comment to this post.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9286"&gt;@Oren_Koren&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9907"&gt;@Adi_Ikan&lt;/a&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 18 May 2020 15:51:45 GMT</pubDate>
    <dc:creator>Oren_Koren</dc:creator>
    <dc:date>2020-05-18T15:51:45Z</dc:date>
    <item>
      <title>Web Conference Applications - Understand what your users are doing</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Conference-Applications-Understand-what-your-users-are-doing/m-p/85688#M11093</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;
&lt;P&gt;A major result of the current COVID-19 pandemic is the significant increase in the use of video conferencing applications. Applications like Zoom, BlueJeans, and Microsoft Teams have become critical to our ability to communicate effectively, both for work continuity, and for keeping up with friends and family in these days of social distancing and sheltering in place.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In&lt;SPAN&gt;&amp;nbsp;the new released package of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.checkpoint.com/products/application-control/" target="_blank" rel="noopener"&gt;Application Control&lt;/A&gt;, the video conference apps detection is focused on 4 major components:&amp;nbsp; Basic Discovery (App Identification &amp;amp; Monitoring), File Transfer (Uploads &amp;amp; Downloads), Remote Control and Desktop Sharing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="conf3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6146i68D8B691F161C93A/image-size/large?v=v2&amp;amp;px=999" role="button" title="conf3.png" alt="conf3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;General page in a dedicated SmartView report (can be downloaded from Check Point blog - link below)&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Conf.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6143i0630842D581AC770/image-size/large?v=v2&amp;amp;px=999" role="button" title="Conf.png" alt="Conf.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;Rule Base granularity - Drop 'Zoom-Download' action for the users in the network:&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="conf2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6145i5A3E7FB21B915F98/image-size/large?v=v2&amp;amp;px=999" role="button" title="conf2.png" alt="conf2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;you can review the full blog and best practices (include download the relevant SmartView report) in the following Check Point blog.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2020/05/18/adaptation-is-the-best-practice-leveraging-application-control-in-the-days-of-video-conferencing/" target="_blank" rel="noopener"&gt;https://blog.checkpoint.com/2020/05/18/adaptation-is-the-best-practice-leveraging-application-control-in-the-days-of-video-conferencing/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;for any comment, input or question - please comment to this post.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9286"&gt;@Oren_Koren&lt;/a&gt;&amp;nbsp;&amp;amp;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9907"&gt;@Adi_Ikan&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 15:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Conference-Applications-Understand-what-your-users-are-doing/m-p/85688#M11093</guid>
      <dc:creator>Oren_Koren</dc:creator>
      <dc:date>2020-05-18T15:51:45Z</dc:date>
    </item>
  </channel>
</rss>

