- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
Is it possible to block any macOS machine from logging into the VPN client?
I have already verified sk182226, but it only works if you enable the compliance function when installing the client.
But in this case I need to block any macOS, even without the compliance function installed.
You need to enable SCV and configure some Windows-specific checks.
See: https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/C...
By default, SCV support is disabled for macOS, so SCV check should fail.
You can enable it and configure a specific policy with: https://support.checkpoint.com/results/sk/sk182226
Hello, thanks for the reply.
It's working fine on Windows.
I enabled the options for MacOS, but if I don't enable the compliance option on the MAC endpoint, it won't allow clients that don't verify SVC to log in.
These are unmanaged MACs and I can't guarantee that they will enable the compliance option, so I wanted to block VPN access from any MAC. Would that be possible?
Attached is the SVC file I'm testing.
Tks
It shouldn't matter if you enable Compliance on the Mac endpoint or not.
You've included Mac-specific checks in your local.scv file (the SCVPolicyMac abd SCVNamesMac sections).
These should be removed if you do not want Macs to connect.
Please check that SCV is actually enabled in Global Properties and the option to ignore when the client doesn't support it is NOT checked as shown below.
Otherwise, I suggest engaging with TAC.
Hello, thanks for the reply.
But I need to completely block MAC users from accessing the site, not even letting them log into the VPN.
Tks
K, understood. I dont know for sure how SCV would work in such instance (never really tested it), but maybe worth check with TAC. let me do some tests in the lab and see how far I get.
Best,
Andy
This is what AI Copilot provided, though to me, seems very similar to the sk you mentioned.
Andy
****************************
To block macOS access to the VPN client, you can stop the Check Point VPN service and GUI process. Here are the steps to do this:
Open the Terminal on the macOS endpoint computer.
Stop the GUI process:
sudo launchctl bootout gui/$(id -u) /Library/LaunchAgents/com.checkpoint.eps.gui.plist
Stop the Check Point VPN service:
sudo launchctl bootout system /Library/LaunchDaemons/com.checkpoint.epc.service.plist
These commands will stop the Check Point VPN client from running on the macOS endpoint computer. If you need to start the services again, you can use the following commands:
Start the GUI process:
sudo launchctl bootstrap gui/$(id -u) /Library/LaunchAgents/com.checkpoint.eps.gui.plist
Start the Check Point VPN service:
sudo launchctl bootstrap system /Library/LaunchDaemons/com.checkpoint.epc.service.plist
This will re-enable the Check Point VPN client on the macOS endpoint computer.
Beowulff_ and Andy,
Have you been able to make any progress on blocking MacOS users? I have a similar scenario and sk182226 also did not resolve.
Thanks
Dan
Hey Dan,
I might try it this Sunday in R82 lab.
Btw, did you ever end up opening TAC case about it?
No sir, I just started looking into this as a new issue for me. I think it was Phone Boy who suggested that the original post owner Beowulff_engage TAC.
Dont worry, I got you. Sorry, just came back from Africa and Canary Islands, no lab access there lol
Once Im back from my folks in Totonto to my home in Ottawa on Sunday, will definitely give this a go.
Hey Dan,
What version are you on? Please let me know, so I can try it on the right one. I have either R81.20 or R82
Hey Dan,
Sorry, was going to try this today, but tired after long drive, so will give it a go tomorrow.
Hey Dan,
Just to update you, tried this on R81.20 and R82, no joy, sorry mate : - (. I wont give up though.
Thanks Andy.
Per your message on Saturday this is R81.20 for Mgmt and Gateways. Did we ever hear from Beowulff_to see if a TAC case was opened?.
Had not seen any confirmation on that, sorry.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 7 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEATue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 13 Nov 2025 @ 10:00 AM (CET)
Cloud Architect Series - Guarding Generative AI: Next-Gen Application Security with CloudGuard WAFFri 14 Nov 2025 @ 10:00 AM (CET)
CheckMates Live Netherlands - Veriti, Threat Exposure ManagementWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY