Appendix G: Permitted IP Addresses to access the Check Point Azure Application

When activating protection for Office 365, Harmony Email & Collaboration installs the Check Point Cloud Security Platform—Emails V2 Azure application in your Microsoft 365 environment.

Check Point uses API calls directed to the Check Point Cloud Security Platform—Emails V2 application to quarantine or restore emails, block users, and perform other actions.

Check Point sends API calls to this application from a specific set of IP networks.

Note - The administrator must treat access attempts from any other IP addresses as unauthorized and potentially originating from threat actors.

Data Region

Public IP address

US

  • 18.205.98.112/32

  • 18.209.206.31/32

  • 18.210.117.69/32

  • 18.213.153.231/32

  • 18.233.42.246/32

  • 18.233.230.110/32

  • 52.203.130.172/32

  • 184.73.16.161/32

Australia

  • 3.105.233.198/32

  • 13.55.67.239/32

  • 13.236.139.38/32

  • 13.236.230.143/32

  • 13.238.33.116/32

  • 13.238.203.5/32

  • 3.24.247.108/32

  • 54.206.57.198/32

Canada

  • 3.98.134.58/32

  • 3.99.86.89/32

  • 15.156.252.195/32

  • 35.182.41.230/32

  • 35.182.206.225/32

  • 52.60.99.220/32

  • 52.60.244.192/32

  • 99.79.92.175/32

Europe

  • 3.252.50.22/32

  • 3.252.50.23/32

  • 3.252.50.24/32

  • 3.252.50.25/32

  • 3.252.50.26/32

  • 3.252.50.27/32

  • 3.252.50.28/32

  • 34.240.80.65/32

India

  • 3.6.250.10/32

  • 3.109.29.21/32

  • 13.126.227.64/32

  • 13.200.211.62/32

  • 13.202.15.143/32

  • 13.202.52.212/32

  • 13.235.12.63/32

  • 43.204.80.178/32

UAE

  • 3.28.79.88/32

  • 3.28.167.79/32

  • 3.29.197.188/32

  • 3.29.205.82/32

  • 40.172.29.94/32

  • 40.172.67.2/32

  • 40.172.71.158/32

  • 51.112.36.44/32

UK

  • 3.10.25.136/32

  • 3.10.90.25/32

  • 3.11.98.163/32

  • 3.11.212.17/32

  • 13.41.113.229/32

  • 13.42.125.75/32

  • 18.170.128.61/32

  • 52.56.244.250/32

Notes:

  • A limitation in Microsoft prevents the application from restricting access to these IP addresses. Check Point recommends using available tools to monitor and alert users of unauthorized access.

  • Check Point may change the list with sufficient notice provided in advance through the product updates blog.