Get in Touch Close Menu

Is Your Security Policy Configured Correctly?

25 February 2022

Is Your Security Policy Configured Correctly?

Wouldn’t it be great if there was an in-built feature that checks your settings are aligned with security in mind? Your cyber security policy is not wide open to letting anyone in, something that offers peace of mind that everything is secure?

Is Your Security Policy Configured Correctly?

Well, you’ll be pleased to know; there is!

Security Best Practices Compliance

The compliance blade is available on the Check Point Management server; it’s a software package enabled by a simple tick box.  

As Check Point says:

The Compliance Blade uses Security Best Practices to make sure that Security Policy rules comply with Check Point configuration or policy recommendations.

Each Security Best Practice contains criteria that match specified parameters in Security Policy rules or configuration settings.

The software’s purpose is to ensure your configuration is monitored continuously for changes to your security posture in-line with your cyber security policy.

An in-built live view is available to help identify poor areas of compliance.

You can schedule a report to be generated and emailed. Alerts can be configured to be sent to administrators when your security posture has changed for the better or worse. 

Security Best Practices Compliance

The compliance blade is also available on Harmony Endpoint to monitor the endpoint.

Harmony Endpoint is one of my favourite security products by Check Point, and this feature is impressive on so many levels.

Business operations

With most users now working remotely, it’s challenging to monitor the current state of a user’s PC/Laptop. Is the endpoint missing any updates, software, or has the latest antivirus definitions been installed or performed a recent Antivirus scan? 

business operations

It’s fantastic that you can configure the compliance blade to react in several ways due to a failure of compliance.

The inability of compliance could be anything from a service not running, missing software, a file/folder present or not, a missing registry key/value, out-of-date Anti-Virus definitions or a routine antivirus scan not performed.

A restricted state can be imposed automatically, blocking all traffic at a network level but still allowing administrator connectivity to perform maintenance to rectify any issues. 

Security awareness for your business

I love how you can customise the remediation actions to act upon changes in compliance, anything from changing registry keys to replacing files on the file system to locking down the endpoint and blocking all network access. 

The above is just a tiny example highlighting the capabilities of the Check Point compliance blade. If you would like to know more, get in contact with our experts today! 

Related Articles

How Do Managed EDR Solutions Work?
5 May 2022

Increasing the scale of your cybersecurity is not easy. After all, cybersecurity is not just about prevention. With cyber-attacks part of our world, organisations must be prepared to respond effectively to threat actors. One such way of preparing and responding is through endpoint detection and response (EDR) and or Managed EDR solutions. Organisations use EDR […]

Find Out More
What is the SOC (Security Operations Centre) Visibility Triad?
19 April 2022

IT environments are becoming increasingly complex and sophisticated, and security teams are faced with the daunting task of keeping potential attackers from accessing their organisation’s environments. As a result, organisations are adopting increasingly complex cybersecurity solutions to combat this growing concern. One way to do this is by using the SOC visibility triad.

Find Out More
The Future of Ransomware: 2022 & Beyond
11 April 2022

Ransomware remains one of the highest priority challenges for organisations of all sizes and across all sectors in 2022.

“Ransomware is the fastest-growing cybercrime for a reason,” says Steve Morgan, founder at Cybersecurity Ventures and editor-in-chief at Cybercrime Magazine. “It’s the proverbial get-rich-quick scheme in the minds of hackers.”

Find Out More