Web and Files Protection

URL Filtering

URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF. rules define which sites can be accessed from within your organization.

To set the URL Filtering mode:

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session..

  3. In the Web & Files Protection tab, under URL Filtering, select a mode:

    • Prevent - The request to enter a site is suspended until a verdict regarding the site is received. Access to the site is blocked if site matches one of the blocked categories or the blacklisting.

      • Allows user to dismiss the URL Filtering alert and access the website.

      • This option is selected by default. It provides the user with access to a blocked site if the end user believes the verdict is unjustified. This option can also be turned off through the Advanced Settings section.

    • Detect - Allows an access if a site is determined as malicious, but logs the traffic.

    • Off - URL Filtering is turned off.

  4. For Advanced Settings, see URL Filtering.

Files Protection

Download Emulation and Extraction

Download Protection rules protects users from malicious content.

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Web & Files Protection tab, under Download Protection, select a mode:

  4. For Advanced Settings, see Download Protection.

Upload Emulation

Upload Emulation uses Threat Emulation to analyze the files you upload to protected domains to identify threats and mitigate them.

Notes:

  • This feature is not supported for Harmony Browse clients managed through the Harmony Endpoint Administrator Portal.

  • The domains may support multiple ways to upload a file. For example, clicking a button to browse and upload the file or drag-and-drop the file. If you upload files by drag-and-drop, the Upload Emulation feature operates in the Detect mode, even if you set to Prevent mode.

 

 

 

00:00: The Upload Emulation feature in Harmony Browse scans the files for threats and mitigates them before you upload the files to a protected domain. 00:09: To enable upload emulation, log in to the Infinity Portal, access Harmony Browse, and click Policy. 00:16: Expand Threat Prevention and click Policy Capabilities. 00:20: Select the Rule to which you want to enable upload emulation. 00:25: In the Web and Files Protection tab, select Prevent for Upload Emulation. 00:30: To specify the protected domains for upload emulation, click Edit. 00:35: Click New and enter the domain name or IP address. 00:39: Make sure that the Upload Emulation is set to Protected and click Save. 00:44: The specified domain is added to the table. Click ok to close this page. 00:49: As the last step, save and install the policy. 00:53: Thank you for watching this video.

To enable Upload Emulation:

  1. Navigate to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Web & Files Protection tab, under Upload Emulation, select a mode:

    • Prevent - Prevents the upload if the file is either known to be malicious or detected as malicious by the Threat Emulation. To specify additional behaviors for the Prevent mode, see Upload Protection.

    • Detect - Allows the user to upload the files even if it is detected as malicious. The incidents are logged.

    • Off - Uploads the file without protection.

  4. To specify the protected domains, in the Upload Emulation section, click Edit.

  5. Click New.

  6. In the Value field, enter the domain name or IP address of the protected domain. For example, my-domain or 1.1.1.1.

  7. Select the required action for Upload Emulation:

    • Protected - Enables upload emulation.

    • Not Protected - Upload Emulation is disabled.

  8. Click Save.

  9. To delete the domain, select the domain and click Delete.

  10. To add multiple protected domains, click :

    • To add a list of protected domains and set Upload Emulation as Protected, click Import Upload Emulation and select the CSV file with protected domains.

    • To add a list of protected domains and set both Password Reuse and Upload Emulation as Protected, click Import All and select the CSV files with protected domains.

  11. To export the list of domains to a CSV file, click :

    • To export only the domains with Upload Emulation set as Protected, click Export Upload Emulation.

    • To export all domains, click Export All.

    The system exports the data to a CSV file.

  12. Click OK.

  13. For Advanced Settings, see Upload Protection.

Credential Protection

Zero Phishing

Phishing prevention checks different characteristics of a website to make sure that a site does not pretend to be a different site and use personal information maliciously.

To set the Zero Phishing mode:

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Web & Files Protection tab, under Zero Phishing, select a mode:

    • Prevent - If site is scanned and found to be malicious, access to it is blocked and log of the incident is shown in the Harmony Browse web management log section.

    • Detect - An incident log is sent but access to the site is not be blocked. Also, the site scan is silent (invisible to the user).

    • OFF – Turns off the feature.

  4. For Advanced Settings, see Credential Protection.

Password Reuse Protection

Alerts users not to use their corporate password in non-corporate domains.

To set the Password Reuse mode:

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Web & Files Protection tab, under Password Reuse, select a mode:

    • Prevent mode - Blocks the user from entering the corporate password and opens the blocking page in a new tab. If you enable Allow users to dismiss the password reuse alert and access the website, then it allows the user to dismiss the blocking page and continue to enter the corporate password.

    • Detect mode - The system does not block the user from entering the corporate password. If a user enters the corporate password, it is captured in the Harmony Browse logs.

    • Off - Turns off password reuse protection.

  4. To add domains to Password Reuse, click New

    Note - Make sure that the endpoint is added to the domain.

  5. In the Value field, enter the domain name or IP address of the protected domain. For example, my-domain or 1.1.1.1

  6. Select the required action for Password Reuse:

    • Protected - Blocks users from reusing the password of protected domain in other domains.

    • Not Protected - Allows users to reuse the password of the protected domain in other domains.

  7. Click Save.

  8. To delete the domain, select the domain and click Delete.

  9. To add multiple protected domains, click :

    • To add a list of protected domains and set Password Reuse as Protected, click Import Password Reuse, and select the CSV file with protected domains.

    • To add a list of protected domains and set both Password Reuse and Upload Emulation as Protected, click Import All and select the CSV file with protected domain.

  10. To export the list of domains to a CSV file, click :

    • To export only the domains with Password Reuse set as Protected, click Enable Password Reuse.

    • To export all domains, click Export All.

    The system exports the data to a CSV file.

  11. For Advanced Settings, see Credential Protection.

Safe Search

Search Reputation

Search Reputation is a feature added to search engines that classifies search results based on URL's reputation.

Notes:

  • It is supported only with Google, Bing, and Yahoo search engines.

  • To enable this feature, ensure that you set URL Filtering Mode to either Prevent or Detect.

To set the Search Reputation mode:

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Capabilities & Exclusions pane, select Web & Files Protection.

  4. In the Web & Files Protection tab, scroll-down to Search Reputation section and select a mode:

    • On - Turns on the feature.

    • Off -Turns off the feature.

When you enable this feature, the icon across the URL in the search results indicate the classification:

Icon

Classification

The website is safe.

Example:

The website is not safe.

Example:

The website is blocked by the Administrator.

Example:

Note - If the Search Reputation cannot classify a URL, then it does not display an icon across the URL. If you want such URLs to be classified and blocked, then enable the Uncategorized checkbox in URL Filtering > Categories > General Use. The Search Reputation classifies Uncategorized URLs as The website is blocked by the Administrator.

Force Safe Search

Force Safe Search is a feature in search engines that acts as an automated filter for potentially offensive and inappropriate content.

To set the Force Search Reputation mode:

  1. Go to Policy > Threat Prevention > Policy Capabilities.

  2. Select the rule.

  3. In the Web & Files Protection tab, under Force Safe Search, select a mode:

    • On - Hides explicit content from the search results.

    • Off - User sees the most relevant results for their search, which may include explicit content like images consisting of violence.

Main features:

  • When ‘Force Safe Search’ is on, Harmony Browse turns on Safe Search on the supported search engines.

  • It is supported with Google, Bing, and Yahoo search engines.

  • Force Safe Search is off by default.

  • Force Safe Search is supported with Google Chrome, and Microsoft Edge browsers.

Advanced Settings

URL Filtering

Note - You must set the URL Filtering Mode to Prevent or Detect to set the Advanced Settings.

Allow user to dismiss the URL Filtering alert and access the website – Allows user to bypass URL filtering and access the website.

Categories

Harmony Browse categorizes websites and you can specify the categories that must be blocked for the user. When you select a category, the URL Filtering rule applies to all sites in the selected category.

To specify the categories to block:

  1. Under Categories, select the category. For example, Bandwidth Consumption.

  2. Click Show and then select the sub-category.

Black List

You can specify specific URLs, domains or IP addresses you want to block.

To black list a domain or IP address, click Show and add the URL, domain or IP address.

Notes:

  • You can add the domain names manually or upload a CSV file with the domain names you want to include in the blacklist.

  • You can use * and ? as wildcards for blacklisting.

    • * is supported with any string. For example: A* can be ADomain or AB or AAAA.

    • ? is supported with another character. For example, A? can be AA or AB or Ab.

  • You can export your blacklist.

  • If you wish to completely block the domain www.test-domain.com, including its sub-domains (sub1.test-domain.com, sub2.test-domain.com, etc’) and it is a naked domain (test-domain.com, without the www), you need to add two values to the block list:

    • *.test_domain.com

    • test_domain.com

Malicious Script Protection

Malicious Script Protection scans Uncategorized websites for embedded malicious JavaScripts. If the domain that hosts the script belongs to any one of these categories, then the page is blocked and the event is logged.

  • Anonymizer

  • Botnets

  • Critical Risk

  • High Risk

  • Medium Risk

  • Phishing

  • Spam

  • Spyware

  • Malicious Sites

  • Suspicious Content

Note - Ensure that you set URL Filtering Mode to either Prevent or Detect.If it is set to Prevent, the page is blocked and the event is logged. If it is set to Detect, the page is not blocked and the event is logged.

To specify malicious script protection:

  • To enable malicious script protection, select Block websites where Malicious Scripts are found embedded in the HTML.

  • To allow users to dismiss the malicious script security alert and access the website, select Allow user to dismiss the Malicious Scripts alert and access the website.

Files Protection

General Settings

Emulation Environments

You can specify the size limit for files that must be sent for Threat Emulation. Files larger than the specified limit are not sent to Threat Emulation.

Upload and emulate files under – Specify the file size limit for Threat Emulation. The default file size limit is 15 MB. The maximum file size limit supported is 100 MB.

Note - Increasing the file size increases the client processing and network traffic required to process large files.

Override Default File Actions

Harmony Browse allows you to override the default file action for the supported and unsupported files.

To override the file action for supported files:

  1. In the Supported Files section, click Edit.

  2. Select the File action and Extraction Mode.

  3. Click OK.

To override the file action for unsupported files:

  1. In the Unsupported Files section, click Edit.

    1. To add a file type, click and enter the File type.

    2. To edit a file type, select the file type and click .

    3. To delete a file type, select the file type and click .

  2. Select the Download action for the file:

  3. Select the Upload action for the file:

  4. (Optional) In the Comments field, enter a comment.

  5. Click OK.

Download Protection

Note - You must set the Download Emulation & Extraction to Prevent or Detect to set the Advanced Settings.

Harmony Browse protects against malicious files that you download to your Endpoint. By default, it sends the files for extraction and emulation to Check Point's Threat Emulation on the cloud before they are downloaded to the Endpoint disk. You can also configure Harmony Browse with Threat Emulation on-premise. For more information, see sk113599.

Supported Files

The supported file types for Threat Emulation are:

Threat Emulation Supported File Types

7z

aspx

app1

arj

bat

bz2
CAB

csv

com

cpl

dll

doc
docx
dot
dotx
dotm
docm

dmg

dylib

exe
gz
hwp
iso

img

iqy
jar

lnk

msi

msg

O

one

pif

pdf

pkg

ppt

pptx

pps

pptm

potx

potm

ppam

ppsx

ppsm

ps1

qcow2

rar

rtf

sh

scr

sldx

sldm

slk

swf
tar

tbz2

tbz

tb2

tgz

udf

uue

wim

wsf

xar

xlt
xls
xlsx
xlm
xltx
xlsm
xltm
xlsb
xla
xlam
xll
xlw
xz
zip

The supported file types for Threat Extraction are:

Threat Extraction Supported File Types

doc

potm

pptx

docm

potx

xls

docx

ppa

xlsb

dot

ppam

xlsm

dotm

pps

xlsx

dotx

ppsm

xlt

fdf

ppsx

xltm

pdf

ppt

xltx

pot

pptm

xlam

one

 

 

Note - Ignore the files types listed in the Harmony Browse Administrator Portal.

Download Emulation Actions

The options available for supported file types of Threat Extraction are:

  • Get extracted copy before emulation completes

    • Extract potential malicious elements - While a file is tested, receive a copy of the file with all suspicious parts removed. Files that support extraction are available for download after the extraction. Files that do not support extraction are available for download only after the emulation and if it is benign.

      • To specify the elements for Threat Extraction in the downloaded file, click Elements to extract and click to add and click to remove.

    • Covert to PDF - For receive the file in a PDF format. If the file is not malicious, users receive the original file when the emulation is finished. Emulation can take up to two minutes.

  • Suspend download until emulation completes – The original file is downloaded if found to be clean.

  • Emulate original file without suspending access - Emulates original file without suspending access to the file and logs the incident. If the file is malicious, it is blocked.

  • AllowThreat Emulation and Threat Extraction is turned off.

Unsupported Files

The options available for unsupported files types are:

  • Allow Download - Allows user to access the file.

  • Block Download - Blocks user from accessing the file.

Custom Settings

Download Emulation and Extraction
  • Block downloads when emulation fails due to size limit or connectivity problem - Select the checkbox to block download of a file if the Threat Emulation of the file fails due to technical reasons, such as file size limit, no internet connectivity and invalid licenses.

  • Block downloads when emulation fails due to file encryption - Select the checkbox to block download of a file, if the Threat Emulation of the file fails to extract the file due to the file encryption.

Upload Protection

Harmony Browse protects against malicious files that you upload to the protected domains. By default, it sends the files to Check Point's Threat Emulation on the cloud before they are uploaded to the domains. You can specify the advanced settings for uploading files that are supported and unsupported by Threat Emulation.

Note - This feature is not supported for Harmony Browse clients managed through the Harmony Endpoint Administrator Portal.

00:00: The upload protection protects your organization from malicious files being uploaded to the protected domains. The files are first sent to Check Point's Threat Emulation for analysis and based on the verdict, the files are either allowed or blocked from upload. 00:15: To enable upload protection, log into the Infinity Portal, access Harmony Endpoint and click Policy. 00:22: Expand threat prevention and select policy capabilities. 00:26: Select the rule to which you want to enable upload protection. 00:30: In the web and files protection tab, click advanced settings. 00:34: Click Upload protection and select an upload protection action for supported and unsupported files. Check Point recommends that you do not select the Allow option as Uploading files without Threat Emulation analysis may pose potential security risks. Once you have selected the action, click OK. 00:53: As a last step, click save and install to install these settings. 00:57: Thank you for watching this video.

Upload Emulation Actions
  • For supported files:

    • Suspend Upload Until Emulation Completes – File uploads to the protected domains are suspended until the Threat Emulation analysis of the files is complete and the verdict is benign.

    • Emulate the file without suspending access and block known malicious files - Malicious files are blocked and not uploaded to protected domains. Rest of the files are sent to Threat Emulation for analysis without suspending the file upload.

    • Emulate the file without suspending access - Files uploaded to the protected domains are logged but not prevented. End user does not receive any notification.

    • Allow - Disables the Upload Emulation feature. That is, allows users to upload files to protected domains without Threat Emulation.

  • For unsupported files:

    • Allow – Allows the upload of file types that are not supported by Threat Emulation to the protected domain.

      Warning - Uploading files without Threat Emulation analysis may pose potential security risks.

    • Block – Blocks the upload of file types that are not supported by Threat Emulation to the protected domain.

    Note - File type policy overrides the default file action selected here. For more information, see Override Default File Actions.

Block Upload by Domain

Allows you to specify domains to which you want to either allow or block upload files, regardless of the Upload Emulation setting.

00:00: The block upload by domain feature in Harmony Browse allows you to specify the domains to which you want to block uploading of files. This feature overwrites the settings in the Upload Protection feature. 00:12: To enable the block upload by domain feature, log in to the Infinity portal, access Harmony Browse and click policy. 00:20: Expand threat prevention and select policy capabilities. 00:24: Select the rule to which you want to enable the block upload domain. 00:28: In the web and files protection tab, click advanced settings. 00:32: Click Upload Protection, and click Edit under Block upload by domain. 00:36: Click the star icon and specify the domain, action and click OK. 00:40: The specified domain and action is listed in the table. Click ok to close the window. 00:46: As the last step, click save and install to install these settings. 00:50: Thank you for watching this video.

To block or allow files upload to a domain:

  1. Navigate to Upload Protection.

  2. In the Block upload by domain section, click Edit.

    The Advanced Settings - Web & Files Protection window appears.

  3. Click

  4. In the Value field, enter the domain name or IP address. For example, my-domain.com or 1.1.1.1.

  5. From the Action list, select the required action:

    • Block

    • Allow

  6. Click OK.

  7. To edit a domain, select the domain and click .

  8. To delete a domain, select the domain and click .

  9. Click OK.

Credential Protection

Note - You must set the Zero Phishing and Password Reuse to Prevent or Detect to set the Advanced Settings.

User can select any of these settings under Zero Phishing:

  • Allow user to dismiss the phishing alert and access the website - It allows the user to dismiss the blocking page and continue to enter the corporate password.

  • Send log on each scanned site

  • Allow user to abort phishing scans

  • Scan local HTML files - By default, the Harmony Browse extension in Chromium-based browsers (Chrome, Microsoft Edge, and Brave) cannot access the local HTML files opened by the browser to scan them for phishing attacks. This setting prompts users to grant permission to Chromium-based browsers to access and scan local HTML files on your PC.

    Notes:

    • You can customize the prompt page. For more information, see Configuring Client Settings Policy

    • This feature is not supported with Safari and Internet Explorer browser extensions.

    To grant permission to access and scan the local HTML files:

    1. When a user opens a local HTML file, the Harmony Browse request access to file URLs prompt appears. Click Click to copy.

    2. Paste the copied path in the address bar of the Chrome browser and press Enter.

    3. Scroll down and turn on Allow access to file URLs.

    4. If the HTML file has an input field, Harmony Browse scans the file and blocks it, if identified as phishing.

  • Disable notifications - Allows you to disable the browser zero-phishing scan notification that appears when users try to enter in an input field.

    Note - Only the notification is disabled but the browser zero-phishing scan is performed in the background indicated by the yellow highlight around the input field.

User can select any of these settings under Password Reuse Protection:

  • To protect a domain, click Edit and enter the domain name or IP address.

  • You can also select Allow users to dismiss the password reuse alert and access the website setting.

Browser Settings

Pin Extension

This feature enables the administrator to configure to allow users to pin or unpin the browser extension to the toolbar.

By default, Harmony Browse extension is pinned to the browser for all users with the Harmony Browse Client version BROWSE_90.09.0001 and higher (Windows) and latest mac clients.

Note - You can unpin the extension only on Chromium browsers, such as Chrome, Edge and Brave. You cannot unpin an extension in Firefox.

Windows

To allow users to unpin the browser extension, clear Always pin the browser extension to the tool bar under Pin Extension.

The user must re-login by locking and unlocking the endpoint and either restart the browser or wait for 15 minutes for the changes to reflect. This is not applicable to endpoints with the Harmony Endpoint Security client installed as the browser extension is pinned automatically through the policy update.

macOS

You cannot disable Extension Pinning through a policy in Harmony Browse.

To manually disable Extension Pinning:

  1. On the endpoint, navigate to /Library/Application Support/Checkpoint/Threat Emulation/.

  2. Remove these lines from the browser specific script. For example, for Chrome, the script file name is install_chrome_ext.sh.

    <key>$PIN_KEY</key>

    <string>$PIN_VALUE</string>

  3. Save and run the script.

  4. Reload the policy on the browser. For example for Chrome, go to chrome://policy and click Reload policies.

Control Browser Notifications

This feature allows administrators to control the following browser notifications:

  • Disable Zero-Phishing notifications - Select the checkbox to disable the zero-phishing scan notification that appears when users try to enter in an input field.

    Note - Only the notification is disabled but the browser zero-phishing scan is performed in the background indicated by the yellow highlight around the input field.

  • Disable Download Emulation & Extraction notifications - Select the checkbox to disable the download emulation and extraction notifications whenever a file is downloaded.

Incognito Mode

This feature allows administrators to control the availability of incognito mode for users. The default option is Off.

Note - This feature is supported only for Endpoint Security client versions E88.60 and higher.

  • Off - The feature does not control the availability of incognito mode.

    Note - Users can access incognito mode depending on the organization policies.

  • Enable - Forces incognito mode to be available for users, overriding any existing settings that might restrict its availability.

  • Disable - Prevents users from accessing incognito mode by disabling it completely.