

This publication and features described herein are subject to change without notice. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. © 2011 Check Point Software Technologies Ltd. Endpoint Security Client R80.10 User Guide
