You can use these elements as matching criteria in the Source and Destination fields of the Access Control policy rules:
The identity of users or user groups
The identity of computers or computer groups
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Introduction-to-Identity-Awareness.htm
A. Application Control
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
The correct awnser is A,
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SecurityManagement_AdminGuide/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?Highlight=Application%20Control
On your URL it also says
"If you enable Identity Awareness on a Security Gateway, you can use it together with Application Control to make rules that apply to an access role. Use access role objects to define users, machines, and network locations as one object."
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Aldrich_Ling
2 months, 1 week agoNando0505
3 months agochaffer
5 months agomfhashmi
5 months, 3 weeks agodfigo
5 months, 3 weeks agodarkboy32
5 months, 3 weeks agodarkdante24
7 months, 2 weeks agoluismg
7 months, 2 weeks agoluismg
7 months, 2 weeks agobigfootqp
7 months, 3 weeks agoyuop
1 year, 1 month ago