
Make sure users have the information and credentials required to authenticate to the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.įor client certificates, use the Certificate Creation and Distribution Wizard (see the "Creating Client Certificates" section). Wizard.Ĭonfigure Web applications, if necessary.

This can be done automatically in the Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients.

To manage your users and their access to resources, make sure to:įor email, calendar, and contact access, configure Mobile Mail or ActiveSync applications.

Mobile Access for Smartphones and Tablets Overview of Mobile Access for Smartphones and Tablets
