<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restricted Policy Delays in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143488#M5343</link>
    <description>&lt;P&gt;For the first time I've just been setting up Endpoint Compliance in the cloud portal.&amp;nbsp; My question to the community is this:&amp;nbsp; Is there a way to make the Restricted policy kick in immediately?&amp;nbsp; TAC said no, it's just the way the blade is designed.&amp;nbsp; But I think this is poor.&amp;nbsp; My customer specifically wants this so that machines that are not compliant are immediately restricted and prevented from being able to log in to VPN.&amp;nbsp; It seems at the moment this isn't possible as it takes several minutes of warning before the Restricted policy actually kicks in.&amp;nbsp; Does anyone know a way around this?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Mar 2022 10:31:35 GMT</pubDate>
    <dc:creator>biskit</dc:creator>
    <dc:date>2022-03-11T10:31:35Z</dc:date>
    <item>
      <title>Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143488#M5343</link>
      <description>&lt;P&gt;For the first time I've just been setting up Endpoint Compliance in the cloud portal.&amp;nbsp; My question to the community is this:&amp;nbsp; Is there a way to make the Restricted policy kick in immediately?&amp;nbsp; TAC said no, it's just the way the blade is designed.&amp;nbsp; But I think this is poor.&amp;nbsp; My customer specifically wants this so that machines that are not compliant are immediately restricted and prevented from being able to log in to VPN.&amp;nbsp; It seems at the moment this isn't possible as it takes several minutes of warning before the Restricted policy actually kicks in.&amp;nbsp; Does anyone know a way around this?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 10:31:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143488#M5343</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2022-03-11T10:31:35Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143496#M5344</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/26803"&gt;@biskit&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Our Compliance Blade state changes are based on our client heartbeat which by default is every 60 seconds. Also by default, our Out Of Compliance state of Restricted is set to 5 heartbeats. If you are using our Harmony Endpoint Cloud/EPMaaS product, these settings/configurations are not configurable via the Infinity Portal/Harmony Endpoint Web Management. You would have configure/manage this through the Smart Endpoint Console application.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled1.png" style="width: 510px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15660i0022A3F537786D82/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled1.png" alt="Untitled1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled2.png" style="width: 697px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15661iAA4C43D9B3A6C8AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled2.png" alt="Untitled2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What you can try and test with is setting the Out Of Compliance/Client will restrict non compliant endpoint after: 5 heartbeats to 1 heartbeat and see if this improves it to what you are expecting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would not recommend changing the client heartbeat (Interval between client heartbeats) as this can cause a ton of communication from the client to the server and will cause the Harmony Endpoint Cloud/EPMaaS resources to run very high and with enough clients deployed even bring down the Harmony Endpoint Cloud/EPMaaS Server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think even with the Out Of Compliance set to 1 heartbeat you will still see somewhat of a delay still due to the communication the client needs to have internally with it's services. drivers and the Compliance Blade itself. This can take anywhere from a few seconds to a couple of minutes depending on the client machine resources and our current Harmony Endpoint client design.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And as TAC has already told you, they are correct. There is no such configuration today with our products that will give you an absolute immediate Compliant/Restrict state. You may be able to, like I explained above, get it down to seconds or a minute but that would be the best that can be done.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 12:59:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143496#M5344</guid>
      <dc:creator>jcortez</dc:creator>
      <dc:date>2022-03-11T12:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143685#M5349</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/35245"&gt;@jcortez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Thanks for your reply.&amp;nbsp; That all makes sense &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I know the blade is currently behaving "by design" but I believe the current design isn't necessarily the right design.&amp;nbsp; &amp;nbsp;I still believe there's room for a "feature request" here.&amp;nbsp; If an endpoint is not compliant we should have the option to apply an &lt;EM&gt;&lt;STRONG&gt;immediate&lt;/STRONG&gt; &lt;/EM&gt;policy - at least (in my case) denying them access to the VPN until the endpoint issues are remedied.&amp;nbsp; Unless you can convince me that it's actually a good idea to not immediately restrict an uncompliant machine?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 21:03:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143685#M5349</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2022-03-14T21:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143686#M5350</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/26803"&gt;@biskit&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Oh I agree. I think the behavior should change as well for immediate restricted state. It makes sense from a security aspect. However, above I was just stating current design. If this is something you and or other customers would like to see change and behave differently, it would require a Request For Enhancement (RFE).&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 21:10:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143686#M5350</guid>
      <dc:creator>jcortez</dc:creator>
      <dc:date>2022-03-14T21:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143721#M5359</link>
      <description>&lt;P&gt;If we think about what makes a EP client client compliant. one minute versus immediate restriction makes no difference at all, as the client already had enough time to wrack havoc in the unrestricted hours before...&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 09:44:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143721#M5359</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-15T09:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted Policy Delays</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143723#M5360</link>
      <description>&lt;P&gt;True...&amp;nbsp; but that doesn't mean I want the uncompliant laptop to connect to VPN and start wreaking havoc on the LAN before it gets restricted.&amp;nbsp; Maybe EP needs to have two levels of non compliance?&amp;nbsp; Something like Minor and Major, with different rulebases?&amp;nbsp; So anything with AV older than 3 days is immediately in Major non-compliance as it boots up and is therefore prevented from connecting to VPN.&amp;nbsp; Just for example...&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe SCV is the other option as I believe that checks every 20 seconds?&amp;nbsp; But that is a nightmare to get right in my experience.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 09:54:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Restricted-Policy-Delays/m-p/143723#M5360</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2022-03-15T09:54:26Z</dc:date>
    </item>
  </channel>
</rss>

