the group monitor syntax above is correct, however I noticed it was not giving consistent results since that setting gets updated/created when user logs in and was taking a while, in the mean time if the Checkpoint VPN is launched the compliance will fail. Instead of spending more time on it, I ended up with creating additional registry settings, one for domain check as below and few other "secret" entries that is unique to your company and custom which can be applied via GPO to all users. The logic will be true for all the entries.
:string ("SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Domain=your_company_domain")
:string ("SOFTWARE\ABC_COMPANY\Loadset\Global\Build\Version>=911")
etc etc......
In addition we did the LDAP integration for the gateway, where the VPN matching criteria in the access role is users=your_company_domain only. This way even if registry and process checks are spoofed via scv, the source identity will restrict network access, besides the VPN authentication to the gateway with or without MFA.
To summarize for a good overall secure solution :-),
a. scv checks based on registry and process (works perfectly fine for large number of users)
b. authentication to gateway using MFA
c. access role rule with source identity as domain users only matching remote access VPN criteria > in-line rules to grant specific network access