Application Control

The Application Control Check Point Software Blade on a Security Gateway that allows granular control over specific web-enabled applications by using deep packet inspection. Acronym: APPI. component of Endpoint Security restricts network access for specified applications. The Endpoint Security administrator defines policies and rules that allow, block or terminate applications and processes. The administrator can also configure that an application is terminated when it tries to access the network, or as soon as the application starts.

This is the workflow for configuring Application Control :

  1. Set up a Windows device with the typical applications used on protected Endpoint computers in your organization. This is your reference device. If you have several different standard images, set up a reference device for each. See Creating the List of Applications on the Reference Device.
  2. Generate the list of applications on the computer by running the Appscan tool. This generates an XML file that contains the details of all the applications on the computer. See Creating the List of Applications on the Reference Device.
  3. Upload the Appscan XML file to the Endpoint Security Management Server A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data. . See Uploading the Appscan XML File to the Endpoint Security Management Server.
  4. Configure the action for each application in the Application Control policy. You can configure which applications are allowed, blocked, or terminated. See Configuring Application Permissions in the Application Control Policy.
  5. Install policy.