Checkpoint Endpoint Vpn Client For Mac



Table of Contents:

  • Endpoint Security Clients Downloads
  • Utilities/Services Downloads
  • Management Console Downloads
  • Documentation and Related SecureKnowledge Articles

Checkpoint’s Endpoint Security VPN Client starts when I log into my Mac (Mac OS X 10.9.5). VPN program from automatically starting on my Mac? To install Endpoint Security VPN for Mac on a client computer: 1. Download the EndpointSecurityVPN.dmg file to the client computer. Double-click the file.

Checkpoint Endpoint Vpn Client For Mac Windows 10

Endpoint Security Homepage is now available.

  1. Endpoint Security VPN for Mac Endpoint Security VPN combines Remote Access VPN with Endpoint Security in a client that is installed on endpoint computers. It is recommended for managed endpoints that require a simple and transparent remote access experience together with desktop firewall rules.
  2. How to install the Check Point VPN Endpoint Security VPN in Mac OSX. In most cases the VPN Client is not needed for VPN access. Unless you have been told that your work requires the client please use the normal SSL VPN. Instructions for usi.

Notes:

Checkpoint Endpoint Vpn Client For Macbook

  • The relevant links to downloads are located in the relevant section, i.e. Standalone Clients, Utilities/Services.
  • The relevant links to documentation are located in the 'Documentation' section.
  • It is strongly recommended that you read the E82.50 Endpoint Security Client for macOS Release Notes and Known Limitations section, before installing this release.
  • Also refer to:
  • For E82.50 release for Windows: Refer to sk165515 - Enterprise Endpoint Security E82.50 Windows Clients
Checkpoint Endpoint Vpn Client For Mac

Endpoint Security Homepage is now available.

Notes:

  • The relevant links to downloads are located in the relevant section, i.e., Standalone Clients, Utilities/Services.
  • The relevant links to documentation are located in the 'Documentation' section.
  • It is strongly recommended that you read the E82.50 Endpoint Security Client for macOS Release Notes
  • Also refer to:

What's New in E82.50 for macOS

Show / Hide this sectionIntroduces the Anti-Malware blade for macOS. Currently, it is EA quality, with the blade’s main capabilities, such as:
  • Displays current status in the client UI.
  • Enables full system scan, manual and scheduled by policy.
  • Quarantines malicious files and enables the user to restore by policy.
  • Updates malware signatures from the Check Point Signature server in the cloud.
  • Reports back about malicious files to the Endpoint Management server.
For more information, see the “Endpoint Security Client for Mac Online Help” pages in the 'Anti-Malware' section.

Enhancements

  • This release includes stability, quality and performance fixes.

Endpoint Security Clients Downloads

Show / Hide this section

Endpoint Security E82.50 Clients for macOS


PlatformPackageLink
macOSE82.50 Check Point Endpoint Security Client for macOS (ZIP)
macOSE82.50 Check Point Endpoint Security Client for macOS (without Capsule Docs and SandBlast Agent) (ZIP)

Standalone Clients Downloads

Show / Hide this section
Note: These Standalone clients do not require Endpoint Security Server installation as part of their deployment.

E82.50 Standalone Clients for macOS

PlatformPackageLink
macOSE82.50 Endpoint Security VPN for macOS - Disc Image (DMG) (DMG)
E82.50 Endpoint Security VPN for macOS - Automatic Upgrade package (PKG) (PKG)
E82.50 Endpoint Security VPN for macOS - Signature for automatic upgrade (signature)
Client

Capsule Docs E82.50 Clients

PlatformPackageLink
macOSE82.50 Capsule Docs Mac Editor

Utilities/Services Downloads

Show / Hide this section
Client

Media Encryption Offline Access Tool E82.xx for macOS

For
PlatformPackageLink
macOSE82.xx Media Encryption Offline Access Tool

Native Encryption Management Hotfix Downloads

Checkpoint Endpoint Vpn Client For MacShow / Hide this sectionIf you want to use the new Native Encryption Management, download the relevant hotfix.

Note: In order to download some of the packages you will need to have a Software Subscription or Active Support plan.
The packages provided below are Legacy CLI packages (not CPUSE packages).

Endpoint Security ServerPackageLink
R77.30.03R77.30.03 Server Hotfix for Native Encryption Management (TGZ)
R77.20 EP6.2R77.20 EP6.2 Server Hotfix for Native Encryption Management (TGZ)
Important: The Native Encryption Management Hotfix is integrated into R80.20

Management Console Downloads

Show / Hide this section

Management Console for Endpoint Security Server

The SmartConsole for Endpoint Security Server allows the Administrator to connect to the Endpoint Security Server and to manage the new Endpoint Security Software Blades.

Endpoint Security ServerPackageLink
R77.30.03SmartConsole for Endpoint Security Server R77.30.03 / E80.89 (EXE)
R77.20 EP6.2SmartConsole for Endpoint Security Server R77.20 EP6.2 / E80.89 (EXE)
R80.20SmartConsole for Endpoint Security Server R80.20sk137593
R80.30SmartConsole for Endpoint Security Server R80.30sk153153
R80.40SmartConsole for Endpoint Security Server R80.40sk165473

Known Limitations

Show / Hide this section
Issue IDDescription
EPS-23363On macOS 10.15 Catalina, Full Disk Access has to be approved for several blades to work properly, including Media Encryption, VPN, Threat Emulation, Anti-Ransomware and Forensics. macOS does not provide any notifications about this automatically, so Endpoint Security presents a UserCheck message, as a guide for which application to grant FDA access, and a button to open the System Preferences.
AHTP-15580Post-upgrade from the E80.89 release, there are no historic AR/TE events shown in the UI.
AHTP-15310If nodeJS is installed on the Mac, build directories should be excluded in SBA policy (AR/EFR and TE) to improve performance.
EPS-23361

If the default name of the compliance rule for checking if assigned blades are running is changed, i.e. cloned or edited, this rule will not be applied to the macOS compliance blade. Then, on the server side there will be no compliance reporting (inform, warn, restrict). Client will also not go into the assumed compliance state.

ESVPN-1920In some rare cases during the upgrade of VPN client from previous version, user may experience temporary inability to connect to VPN site. Delay may be from seconds to several minutes. To address this issue user should perform reboot of operating system.
EPS-26022Media Encryption blade: Media scan - not supported.

Checkpoint Endpoint Vpn Client For Mac Os

Anti-Malware Blade Limitations
Issue IDDescription
EPS-26010Enable Web protection - not supported (always off)
EPS-26011Scan Mail messages - not supported (always off)
EPS-26012Signature source settings - not supported (only External Check Point Signature server setting is supported)
EPS- 26014Push operations:
  • Scan for malware - not supported
  • Update malware for signature database - not supported
  • Operations restore file from quarantine - not supported
EPS-26015Scan targets settings:
  • Critical areas - not supported (always on)
  • Optical drives - not supported (always off)
  • Mail messages - not supported (always off)
  • Unrecognized devices - not supported (always off)
EPS-26016Configure threat cloud knowledge sharing - not supported
EPS-26017Process exclusion - MD5 not supported
EPS-26020Contextual scan - not supported (Finder does not have option for scan)
EPS-26059Anti-Malware detections integration with Forensics report - not supported.

Documentation and Related SecureKnowledge Articles

Checkpoint Endpoint Vpn Client For Mac Client

Show / Hide this section
Document
E82.50 Endpoint Security Client for Mac
E82.50 Endpoint Security Client for macOS Release Notes
Remote Access VPN Clients
E82.50 Endpoint Security VPN Clients for macOS Release Notes
E80.71 and higher Endpoint Security VPN for Mac Administration Guide

Check Point Endpoint Security Vpn Client Mac

For more information on Check Point releases see: Maintrain Release map, Maintrain Upgrade map, Maintrain Backward Compatibility map, Maintrain Releases plan.

Checkpoint Endpoint Security Vpn Client Macos

For more information on the Enterprise Endpoint Security E82.00 Client, see:

You can also visit our Endpoint forum, Remote Access forum, Capsule Docs forum, or any other CHECKMATES forum to ask questions and get answers from technical peers and Support experts.

For more information on Check Point releases see: Maintrain Release map, Maintrain Upgrade map, Maintrain Backward Compatibility map, Maintrain Releases plan.

For more information on the Enterprise Endpoint Security E80.71 Client, see:

  • For installation and upgrade instructions, use the procedures in: Installation and Upgrade Guide for Gaia Platforms R77 Versions
You can also visit our Endpoint Security forum, Full Disk Encryption forum, Media Encryption & Check Point GO forum or any other Check Point discussion forum to ask questions and get answers from technical peers and Support experts.

Revision History

Show / Hide this section
DateDescription
07 Apr 2020First release of this document.

This article lists general limitations for Check Point Endpoint Security Client for macOS.
These limitations are in addition to those listed in the corresponding Known Limitations articles for each release.

Table of Contents

  • Compliance Blade
  • Firewall Blade
  • FileVault Management
  • Compliance Blade
  • URL Filtering Blade
  • Installation

The following features are not supported on Check Point Endpoint Security Client for macOS:

General Limitations
Push Operations are ignored for macOS client
Centralized Client Deployment from Software Deployment Policy is not supported

Endpoint Client User Interface Localization is not supported

The following configurations in Common Client Settings Policy are not supported:
  • Client user interface settings: configurations such as custom preboot and One Check images and appearance of tray icon.
  • Allowing users to disable network protection on their computers.
  • Installation and upgrade settings
  • Uninstall Password
Telemetry data not generated
Compliance Blade
Remediation actions are not triggered on macOS
Environment variables in path of checked files are not supported
Compliance blade on macOS currently supports checks for the following Anti-Virus vendors:
  • Kaspersky
  • Check Point
  • Sophos
  • McAfee
  • Symantec
  • TrendMicro
  • Norton
The following compliance checks are not supported:
  • Latest service packs installed
  • running secure screen saver
VPN Blade
SCV Compliance check ('Use Compliance Blade' state should be defined in order to enforce client compliance prior to VPN connection)
Firewall Blade
Disable Wireless On Lan feature is not supported
Application Control is not supported
Individual IPv6 addresses cannot be blocked. One can set “IPv6 block all” for all IPv6 addresses.
Full Disk Encryption (FDE) Blade
(From E80.71 LA, FDE Blade is replaced by FileVault blade)
Password change in FDE pre-boot is not synched to macOS
Smart Card login in FDE pre-boot is not supported
OneCheck is not supported
FileVault Blade
Only system volume is encrypted.
Institutional Recovery Key can only be imported once.
Audit logs are not generated.
Assigning FileVault users using SmartEndpoint is not supported.
User Acquisition setting 'Continue to acquire users after pre-boot has been enforced.” is not supported.
User Acquisition setting “Pre-boot enforcement will begin after at least one user has been acquired after X days” is not supported.
Media Encryption Blade
Offline Mode Remote Help (MEPP / macOS Offline Access Tool does not support Remote Help)
Custom Encryption is not supported (Media Encryption does not support configuration of which file(s) should be encrypted)
Port Protection is not supported on macOS
CD/DVDs and storage devices connected to ports other than USB, are not supported
External Media that are mounted as virtual devices (Core Storage or APFS (Apple File System )) are not supported.
Time Machine using external media is not supported.
Media formatted as NTFS is not supported.
Media Encryption blade: Media scan - not supported.
Anti-Malware Blade
Anti-Malware Blade is not supported on macOS client. Resolved in sk165573 - Enterprise Endpoint Security E82.50 macOS Clients
Contextual scan - not supported (Finder does not have option for scan). Resolved in sk166955 - Enterprise Endpoint Security E83.200 macOS Clients
EPS-26010: Enable Web protection - not supported (always off)
EPS-26011: Scan Mail messages - not supported (always off)
EPS-26012: Signature source settings - not supported (only External Check Point Signature server setting is supported)
EPS-26014:
Push operations:
  • Scan for malware - not supported
  • Update malware for signature database - not supported
  • Operations restore file from quarantine - not supported
EPS-26015:
Scan targets settings:
  • Critical areas - not supported (always on)
  • Optical drives - not supported (always off)
  • Mail messages - not supported (always off)
  • Unrecognized devices - not supported (always off)
EPS-26016: Configure Threat Cloud knowledge sharing - not supported
EPS-26017: Process exclusion - MD5 not supported
EPS-26059: Anti-Malware detections integration with Forensics report - not supported.
URL Filtering Blade
URL Filtering is supported using Agent Chrome Browser Extension for SandBlast Agent Web Management users.
Capsule Docs Blade

For list of Capsule Docs limitations, refer to sk108376

Installation

In macOS 10.13 and later, the gatekeeper requests consent from the end user before allowing to load a third party kernel extension for the first time.
It is possible to avoid this by preparing the installation of Endpoint Security on each machine by deploying a Device Management Kernel Extension Policy Payload containing the Check Point team identifier.

In macOS 10.13 and later, the gatekeeper warns when installing quarantined software: 'Endpoint Security installer can't be opened because the identity of the developer cannot be confirmed. Your security preferences allow installation of only apps from the App Store and identified developers.”
The macOS gatekeeper may quarantine third party software for multiple reasons, but it is possible to avoid this by either (1) Right-clicking the EPS installer in Finder and selecting 'Open'. (2) Removing the com.apple.quarantine attribute before opening the EPS installer.

In macOS 10.15 and later, the gatekeeper blocks the very first launch of third party executables that require access to user's files and folders.
The end user needs to open the macOS System Preferences Privacy-Full Disk Access dialog and accept each executable. Right after completing installation, Endpoint Security guides the end user to complete this process.

In macOS 10.15.4 and later, the gatekeeper regularly informs the end user about running 'legacy third party kernel extensions'.

Related solutions: