<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protect Terminal Servers in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/102503#M3378</link>
    <description>&lt;P&gt;I'm also interested in the reply.&lt;/P&gt;&lt;P&gt;We need server protection as well. We installed it on regular servers and on domain controllers and had to finetune... we had issues with dfs replication and had to exclude that.&lt;/P&gt;&lt;P&gt;There is very few documentation about this and the product doesn't seem mature enough for servers. And Terminal servers and XenApp are even tougher to take on. I'm afraid at this moment we have no choice but use another vendor for servers.&lt;/P&gt;&lt;P&gt;(and maybe I got somebody's attention who will now tell us we should no longer worry?)&lt;/P&gt;&lt;P&gt;VDI setups such as XenDesktop are supported now though (from E84.20 and higher) but those are client OS'es&lt;/P&gt;</description>
    <pubDate>Wed, 18 Nov 2020 14:06:59 GMT</pubDate>
    <dc:creator>Jeroen_Demets</dc:creator>
    <dc:date>2020-11-18T14:06:59Z</dc:date>
    <item>
      <title>Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12253#M3370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does&amp;nbsp;Check Point have some kind of&amp;nbsp;best practices or&amp;nbsp;solution to protect Terminal Servers and remote desktop users against threats?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our users rely heavily&amp;nbsp;on Terminal Servers and do most of their work from there.&lt;/P&gt;&lt;P&gt;What is the best way to protect them&amp;nbsp;when they downloading and opening files, moving files from/to the file servers, etc.?&amp;nbsp; &amp;nbsp;On the endpoint we have&amp;nbsp;SBA, but when they connect to the Terminal Server, SBA is no use.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Did&amp;nbsp;anyone try to install Sandblast agent on Terminal servers&amp;nbsp;and succeeded (I saw some previous posts pointing for POC, but, are there real live deployment out there)?&lt;/P&gt;&lt;P&gt;2. Is there another solution to protect users on terminal servers (Doesn't have to be Check Point but a complementary&amp;nbsp;solution)?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 17:08:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12253#M3370</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-11-01T17:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12254#M3371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To the best of my knowledge, and I am not an expert on Terminal Services, the only difference in protecting your users is in implementation of the&amp;nbsp;Terminal Servers Identity Agent which will allow you to create a Role Based access rules. Otherwise, traffic generated by the terminal server will be inspected in the regular fashion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terminal Servers Identity Agent&lt;BR /&gt;Dedicated client agent installed on Microsoft® Windows-based application server that hosts Terminal Servers, Citrix XenApp, and Citrix XenDesktop services. This client agent acquires and reports identities to the Check Point Identity Awareness Security Gateway. In the past, this client agent was called Multi-User Host (MUH) Agent.&lt;BR /&gt;You can download the Terminal Servers Endpoint Identity Agent from the Identity Awareness Gateway:&lt;BR /&gt;&lt;A href="https://&amp;lt;Gateway_IP_Address&amp;gt;/_IA_MU_Agent/download/muhAgent.exe"&gt;https://&amp;lt;Gateway_IP_Address&amp;gt;/_IA_MU_Agent/download/muhAgent.exe&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 20:15:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12254#M3371</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-01T20:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12255#M3372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the answer Vladimir,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;identity awareness blade&amp;nbsp;is not used directly for threat prevention. IDA helps to monitor users activity and prevent access to where they shouldn't have access. The problem is when&amp;nbsp;users in remote desktops are using legit services like email, file sharing, and web, they will not be protected&amp;nbsp;inside the remote desktop session (only on the network level but not on the remote session itself).&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I can install an Anti-Virus on the remote desktop but for APT's, Phishing attacks, Ransomware, etc., there is no way to mitigate them. Or maybe I am wrong.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many good articles on how to secure the RDP&amp;nbsp;protocol, RDP sessions, and RDP servers but once the user is inside the RDP session, there is no control over what happens.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2018 11:08:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12255#M3372</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-11-02T11:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12256#M3373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shahar,&lt;/P&gt;&lt;P&gt;The IA blade indeed simply addresses Access Control aspects of security in Terminal Services.&lt;/P&gt;&lt;P&gt;As to the rest of your concerns, I believe that the majority of the TP/TX functionality is applicable to the terminal services.&lt;/P&gt;&lt;P&gt;Consider that the traffic generated by TS clients will still be going through the same AV, AB, IPS, TE and TX on the gateway and this should provide you with pretty robust protection.&lt;/P&gt;&lt;P&gt;There is a general difficulty installing browser plugins on TS and it would be good to hear from Check Point if there are supported ways and means to achieve that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2018 15:43:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12256#M3373</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-11-02T15:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12257#M3374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perimeter protection cannot block everything, especially not files download via the web (without using hold mode) or files which are received&amp;nbsp;via other protocols or media. The endpoint layer can provide this layer of protection and prevention but it is&amp;nbsp;a technical difficulty both from the deployment aspects (browser plugin) and also performance&amp;nbsp;wise. Even if it is possible, since remote desktop sessions and Sandblast agent are resources consuming, it can&amp;nbsp;create a performance challenges on the session host.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2018 16:13:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12257#M3374</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-11-02T16:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12258#M3375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even that CP supports all windows servers, we have faced a lot of issues with SBA on Windows running Terminal Services such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) The hard drive fills up unexpectively&lt;/P&gt;&lt;P&gt;b) Pop up messages appears to all users&lt;/P&gt;&lt;P&gt;c) Unstable server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have opened several cases with TAC for more than a year now without much success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charris Lappas&lt;/P&gt;&lt;P&gt;PS. There is a special Identity Agent for Terminal Services that works really works, but that is to distinguish which user is doing what, not for securing the user/server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 06:34:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12258#M3375</guid>
      <dc:creator>Charris_Lappas</dc:creator>
      <dc:date>2018-11-19T06:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12259#M3376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Are there any complementary solutions or 3rd party integrations for terminal servers and Remote Desktop environments? I tried to look for a solution that can give users the same protection and threat prevention as endpoint security does on PC/laptops but couldn’t find any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Nov 2018 07:46:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/12259#M3376</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2018-11-20T07:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/86733#M3377</link>
      <description>&lt;P&gt;After almost 2 years of this post, does anyone know if there is any improvement or compatibility in Roadmap for Sandblast Agent in Windows Terminal services?&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 15:38:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/86733#M3377</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2020-05-29T15:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/102503#M3378</link>
      <description>&lt;P&gt;I'm also interested in the reply.&lt;/P&gt;&lt;P&gt;We need server protection as well. We installed it on regular servers and on domain controllers and had to finetune... we had issues with dfs replication and had to exclude that.&lt;/P&gt;&lt;P&gt;There is very few documentation about this and the product doesn't seem mature enough for servers. And Terminal servers and XenApp are even tougher to take on. I'm afraid at this moment we have no choice but use another vendor for servers.&lt;/P&gt;&lt;P&gt;(and maybe I got somebody's attention who will now tell us we should no longer worry?)&lt;/P&gt;&lt;P&gt;VDI setups such as XenDesktop are supported now though (from E84.20 and higher) but those are client OS'es&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 14:06:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/102503#M3378</guid>
      <dc:creator>Jeroen_Demets</dc:creator>
      <dc:date>2020-11-18T14:06:59Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/105399#M3379</link>
      <description>&lt;P&gt;+&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;interested&amp;nbsp;too&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 17:53:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/105399#M3379</guid>
      <dc:creator>Nikolay_Petrush</dc:creator>
      <dc:date>2020-12-14T17:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Protect Terminal Servers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/106239#M3381</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/15922"&gt;@Nikolay_Petrush&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27485"&gt;@Shahar_Grober&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9279"&gt;@Jeroen_Demets&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1015"&gt;@MikeB&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/20813"&gt;@Charris_Lappas&lt;/a&gt;&amp;nbsp;It's on our short-term roadmap, in the meantime please follow this &lt;A title="sk167575" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167575&amp;amp;partition=Internal&amp;amp;product=Endpoint" target="_self"&gt;sk167575&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;We can take it offline and discuss it in more detail, my email is kobieb@checkpoint.com.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Dec 2020 08:28:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protect-Terminal-Servers/m-p/106239#M3381</guid>
      <dc:creator>Kobie_Bendalak</dc:creator>
      <dc:date>2020-12-23T08:28:27Z</dc:date>
    </item>
  </channel>
</rss>

