You can use these elements as matching criteria in the Source and Destination fields of the Access Control policy rules:
The identity of users or user groups
The identity of computers or computer groups
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Introduction-to-Identity-Awareness.htm
A. Application Control
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
The correct awnser is A,
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
On your URL it also says
"If you enable Identity Awareness on a Security Gateway, you can use it together with Application Control to make rules that apply to an access role. Use access role objects to define users, machines, and network locations as one object."
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Aldrich_Ling
1 year agoNando0505
1 year, 1 month agochaffer
1 year, 3 months agomfhashmi
1 year, 3 months agodfigo
1 year, 3 months agodarkboy32
1 year, 3 months agodarkdante24
1 year, 5 months agoluismg
1 year, 5 months agoluismg
1 year, 5 months agobigfootqp
1 year, 5 months agoyuop
1 year, 11 months ago