Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Chinmaya_Naik
Advisor

Checkpoint Endpoint Blades (User/Machine Based)

Its a Important part when we going to create a new virtual group during implementation to segregate the machine/user with different group.

But when you going to create a new virtual group then we able to see two option :

  1. Virtual Group (Used for Both User & Machine)
  2. Computer Group (Used Only for Machine)
 

Different blades group is use base in the following chart :

FDE – Machine Based
MEPP – User Based
One Check – User Based
Capsule Docs – User Based
Anti-Malware – User Based
Anti -Ransomware, Forensics and remediation – Machine Based
Anti-Bot – User Based
Threat Emulation and Threat Extraction – User Based
Compliance – User Based
URL Filtering – Machine Based
Firewall – User based
Access Zones – User Based
Application Control – User Based
Client Settings – User Based

As per my personal experience use “computer group” for machine based policy even you have a option to create "virtual group" for machine based.

 

Regards

@Chinmaya_Naik

0 Kudos
5 Replies
PhoneBoy
Admin
Admin

What's the logic here?
0 Kudos
Chinmaya_Naik
Advisor

Hi @PhoneBoy 

Thanks for the update.

The login behind is :

As I was face a challenge  on multiple environment , when I create a Virtual Group instead of computer group and create a policy for Media encryption , Full disk encryption and Anti -Ransomware then policy is not applied on End machine its reflect the default policy only.

Regards

@Chinmaya_Naik 

0 Kudos
Norbert_Bohusch
Advisor

To correct things.

If you are applying a virtual group to a policy, then the content is only taken based on the blade type.

So user-based blades use the users in this group and machine-based blades use the machines in this virtual group.

 

If you want to apply machine-based groups to a user-based blade this can be forced using machine-groups.

There is no other way around to force machine-based blades to use users for rules.

Reason: Think of FDE encrypting/decrypting disk based on logged on user...

0 Kudos
PhoneBoy
Admin
Admin

Right and that makes total sense.
0 Kudos
Chris_Butler
Collaborator

I have a few questions after reading the relevant sections in R81.20 Harmony Endpoint Server Administration Guide and still not being sure about them
Googling after that brought me here

Considering what I read above in this post:

1) I am curious as to how it makes sense for the firewall blade to be user based? 
If you are protecting a workstation with inbound rules against possible inbound attacks from, say, a poisoned device on your internal network which would be in a Trusted Zone, how is the policy handled when nobody is logged in, for example?

If a firewall policy will follow a user around from a workstation that makes sense to have very limited inbound ports open, to a server with more (or less, or different sets) of them needing to be open, how do you differentiate, and close ports on the server conttrasted with the workstation? 


2) how do I define firewall rules  for workstations regardless of who is logged in?, the way  you can with GPOs that use Computer Policy for Windows Defender Firewall?

I am looking at the admin guide as like the OP did, and I am not seeing guidance or it explicitly saying you can use a Virtual Computer Group to apply a rule to a whole workstation or server..


Some things I have learned since moving from Symantec to CPEP:
When I saw the capability of CheckPoiint Endpoint to reverse a ransomware attack in person from our CE running a scenario on a laptop, I  jumped ship back in 2017 from Symantec Enterprise Endpoint protection.
I was also jazzed about the idea of running the endpoint management and our security management from a shiny new Smart-1 410 loaded with RAM, using a unified set of CheckPoint tools.
It was sized just fine for the task, One gateway, 26 workstations, a handful of servers, 26 humans who don't use very demanding internet based applications (almost everything is on premises)

We also no longer had to give up a dedicated Windows Server Volume license for the Symantec management server.

However, what I found quickly is that Symantec's solution was much easier to get started with in an Active Directory Domain based network of windows workstations and servers..
Windows 10 / Server 2019 starts in a pretty locked down Windows Firewall state by default, Symantec incorporates that starting point.
Maintaining Symantec's firewall component was also easier, as Symantec Endpoint Firewall integrated with the PC's built in Windows Defender Firewall, or at least the API that accepted firewall rule changes from GPOs or application installers..
It could incorporate and allow local workstations application software insallers to open specific ports needed for that application, presumably through some kind of windows Defender Firewall API
It also respected GPOs that I had set up, Enable Remote Management, so ADUC Right click on a workstation and select manage will work from specified management workstations.
This, by my recollection all spilled up to the management server as well, you could see it up there, and set overrides if you wanted to, etc.
You started out more locked down than you do with CPEP, by far.. And maintenance was much more flexible.

Considering my workload here in a smaller shop that runs tightly with just me as the IT Director and basically the staff,
I left my checkpoint endpoint firewall policy wide open rather than risking breaking the vertical applications we use,
or stuff like ShadowProtect which needs a nonstandard port opened for you to centrally monitor backup jobs from a workstation,
or all the GPOs I had to control the firewall from Administrative Templates.

All that work using MS tools in AD where I could previously move workstations into Test OUs to test new firewall / services enablement related settings were now largely wasted work..

I have left that CPEP Firewall blade policy alone in the wide open state trusting that Endpoint would only trust my internal networks at least.
I am now realizing that I forgot about the endpoint firewall policy and Access Zone Corporate Trusted Zones having ALL_Internet in it, and I now know that is not by design for production and it is a bad thing.
And I am afraid to change the Zones or policy in production,
Until I can do it for a TEST PC
Regardless of who logs into it, as I don't want to tie a policy change to any of the real users in the domain who have interactive login permissions here. As all of them are logged into a workstation already.


I am rambling a bit here, but I wonder if there is a good discussion or thread somewhere that has more examples of real world policies and Trusted Zone configurations so I can have more of a warm fuzzy before I go locking things down...

I am revisiting this now because I am about to upgrade all our Windows 10 workstations to Windows 11, one at a time, in place..
I created a new OU called Workstations_11 and was going to review all the attached GPOs on the production Workstations_10 OU and either link them to Workstations_11 as-is or create more appropriate versions of the GPOs in the new OU...   

I then remembered that I really need to go down the Check Point Endpoint Firewall blade rabbit hole again, when I came upon the GPOs that used to allow remote management, or Spiceworks scanning, or RDP access, and remembered that they are meaningless insofar as the Windows Firewall parts of what they do. 

I never really got around to building a set of EP firewall policy rules because  It is difficult having to create a set of baseline rules to at least match what a Windows Defender Firewall default locked down state is, And specific exceptions for applications on specific sets of workstations or servers like Sage 50, whose software installers would otherwise set up the exceptions for you is a bit of a nightmare to manage from one central policy in a managment server that still has some growing pains in it's implementation for on premises shops like mine.

 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events