User Guide

ICS Dissolvable Agent for SafeGuard Administration Guide
10
Chapter 1: Introduction
Check Point Integrity™ Clientless Security (ICS) protects your network by scanning end
point computers. Use it to do the following:
Check end point computers for known spyware, worms, and other potential
threats
Check that end point computers are compliant with your anti-virus, firewall, and
other software policies
Protect data on end point computers from keyloggers
Integrity Clientless Security Features
ICS consists of several features, each providing a unique type of security protection. You
can choose which features to implement. This section provides an overview of these
features.
Integrity Clientless Security Scanner
Use the Integrity Clientless Security Scanner policies to make sure that end point
computers connecting to your network meet your security requirements. The Integrity
Clientless Security Scanner checks end point computers for applications according to the
enforcement rules you create. Enforcement rules either prohibit or require certain
applications. If the end point computer does not meet the requirements of the
enforcement rule, it is considered to be ‘non-compliant’. You can choose to restrict or
warn non-compliant users or simply log the event. For more detailed information about
enforcement rules, see Understanding Enforcement Rules on page 24.
Reports
Use reports to monitor how ICS is protecting your network and to plan new policies. For
more information about reports, see Reports on page 36.
ICSInfo Utility
ICS includes the ICSInfo Utility. The ICSInfo utility collects program and other
information from end point computers that you can use when creating your policies or
troubleshooting user issues. See Troubleshooting End Point User Issues on page 40.