Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
11-2
Overview of Check Point Architecture and
Configuration
Integrate OfficeScan installations with Check Point™ SecureClient™ using Secure
Configuration Verification (SCV) within the Open Platform for Security (OPSEC)
framework. Refer to the Check Point SecureClient OPSEC documentation before
reading this section. Documentation for OPSEC can be found at:
http://www.opsec.com
Check Point SecureClient has the capability to confirm the security configuration of
computers connected to the network using Secure Configuration Verification (SCV)
checks. SCV checks are a set of conditions that define a securely configured client
system. Third-party software can communicate the value of these conditions to Check
Point SecureClient. Check Point SecureClient then compares these conditions with
conditions in the SCV file to determine if the client is considered secure.
SCV checks are regularly performed to ensure that only securely configured systems are
allowed to connect to the network.
SecureClient uses Policy Servers to propagate SCV checks to all clients registered with
the system. The administrator sets the SCV checks on the Policy Servers using the SCV
Editor.
The SCV Editor is a tool provided by Check Point that allows you to modify SCV files
for propagation to client installation. To run the SCV Editor, locate and run the file
SCVeditor.exe on the Policy Server. In the SCV Editor, open the file local.scv in the
folder C:\FW1\NG\Conf (replace C:\FW1 with the installation path for the Check
Point firewall if different from the default).
For specific instructions on opening and modifying an SCV file with the SCV Editor,
see Check Point for OfficeScan Configuration on page 11-4.










