<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Secure Configuration Verification in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227191#M3164</link>
    <description>&lt;P&gt;Hello&lt;BR /&gt;Tell me how to correctly add the item about checking whether the device is in the domain or not to the Secure Configuration Verification file?&lt;BR /&gt;I have it now and when I start the VPN it skips any device (below are two screenshots),&amp;nbsp;the first is the parameters for checking whether the device is in the domain, the second is the parameters for checking and global parameters.&lt;BR /&gt;I do all the settings through the terminal on the gateway, in the vi editor, so that nothing goes.&lt;BR /&gt;And tell me, can there be only one policy file?&lt;BR /&gt;If so, is it possible that several criteria for verification are set in one file?&lt;BR /&gt;What's the point, in my organization there are several options for connecting to a VPN, from corporate devices and from personal devices to a VPN, so the result should be the following:&lt;BR /&gt;1. The vpn-users, vtn-term, vpn-route, vpn-constructors group should be checked.&lt;BR /&gt;2. If the user has a vpn-users group, then the domain computer is checked or not, if the domain computer is allowed, if the computer is not a domain computer, we do not let it.&lt;BR /&gt;3.If the user has a vpn-term group, vpn-routes, vpn-constractors, then the domain comp is checked or not, if the domain comp is not allowed, if the computer is not domainy, we check the Windows, antivirus and the relevance of the antivirus database. If there is at least one discrepancy, we do not let him in.&lt;BR /&gt;All groups and users are domain-specific.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Sep 2024 11:20:59 GMT</pubDate>
    <dc:creator>RAlexander</dc:creator>
    <dc:date>2024-09-19T11:20:59Z</dc:date>
    <item>
      <title>Secure Configuration Verification</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227191#M3164</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;Tell me how to correctly add the item about checking whether the device is in the domain or not to the Secure Configuration Verification file?&lt;BR /&gt;I have it now and when I start the VPN it skips any device (below are two screenshots),&amp;nbsp;the first is the parameters for checking whether the device is in the domain, the second is the parameters for checking and global parameters.&lt;BR /&gt;I do all the settings through the terminal on the gateway, in the vi editor, so that nothing goes.&lt;BR /&gt;And tell me, can there be only one policy file?&lt;BR /&gt;If so, is it possible that several criteria for verification are set in one file?&lt;BR /&gt;What's the point, in my organization there are several options for connecting to a VPN, from corporate devices and from personal devices to a VPN, so the result should be the following:&lt;BR /&gt;1. The vpn-users, vtn-term, vpn-route, vpn-constructors group should be checked.&lt;BR /&gt;2. If the user has a vpn-users group, then the domain computer is checked or not, if the domain computer is allowed, if the computer is not a domain computer, we do not let it.&lt;BR /&gt;3.If the user has a vpn-term group, vpn-routes, vpn-constractors, then the domain comp is checked or not, if the domain comp is not allowed, if the computer is not domainy, we check the Windows, antivirus and the relevance of the antivirus database. If there is at least one discrepancy, we do not let him in.&lt;BR /&gt;All groups and users are domain-specific.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 11:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227191#M3164</guid>
      <dc:creator>RAlexander</dc:creator>
      <dc:date>2024-09-19T11:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Configuration Verification</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227263#M3165</link>
      <description>&lt;P&gt;Did you install policy after making changes as described here?&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk38702" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk38702&lt;/A&gt;&lt;BR /&gt;SCV policy applies to all users equally, I believe.&lt;BR /&gt;Don't believe you can make specific policies for specific groups of users.&lt;BR /&gt;For more granular options, I suspect you'll have to use Endpoint Compliance features.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2024 16:14:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227263#M3165</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-19T16:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Configuration Verification</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227381#M3166</link>
      <description>&lt;P&gt;Thanks for the answer.&lt;BR /&gt;Everything worked out,&lt;BR /&gt;he was inattentive and ruled the policy on the gateway, not on SMS.&lt;BR /&gt;But there is still a question with the implementation of my scenario. Are you saying to use Endpoint Compliance, is this when choosing Endpoint instead of Mobile when installing the agent?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 13:48:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227381#M3166</guid>
      <dc:creator>RAlexander</dc:creator>
      <dc:date>2024-09-20T13:48:42Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Configuration Verification</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227418#M3167</link>
      <description>&lt;P&gt;For the client piece, yes.&lt;BR /&gt;To use/manage such features, you need Harmony Endpoint and the appropriate licenses.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 19:32:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227418#M3167</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-20T19:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Configuration Verification</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227432#M3168</link>
      <description>&lt;P&gt;Definitely harmony endpoint, as Phoneboy said. Its way more robust and has bunch of more features.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 22:39:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Secure-Configuration-Verification/m-p/227432#M3168</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-20T22:39:53Z</dc:date>
    </item>
  </channel>
</rss>

