Remote Users

Harmony Connect provides remote users with secure Network-Level accessClosed Access to your corporate resources in the network. (corporate) and Internet access for PCs (Windows and macOS) through the Harmony Connect Agent.

Setting Up Secure Network-Level Access for Remote Users

To set up a secure Network-Level access for remote users:

  1. Add your data center or cloudClosed An administrator approved Harmony Connect cloud location that processes the internet and corporate traffic. infrastructure. See Adding a New Data Center or Cloud Infrastructure.

  2. Select a cloud location that is nearest to your remote users. See Managing User Locations.

  3. Ensure that your bypassed networks does not include subnets of the data center to which you want to provide a secure access. See Bypass Destinations.

  4. Install Linux and DockerClosed Docker is a set of platform as a service products that use OS-level virtualization to deliver software in packages called containers. on your data center or cloud infrastructure. See Appendix A - Installing Linux and Docker.

  5. Install the Connector on the Docker container. See Installing the Connector for Network-Level Access. To monitor the status of a Connector, see Monitor Connector.

  6. If your corporate applications use a corporate DNS server, then resolve your corporate DNS servers into IP addresses. See Corporate DNS Servers.

  7. Define access condition. For more information, see Device Posture.

  8. Send invitation to users by e-mail or an Identity Provider to download the Harmony Connect Agent. See Users.

  9. Define your network access policy. See Network Access.

  10. Select the mode of connectivity (Internet only, corporate network only or both) for your remote users. See Connectivity Mode.

Setting Up Secure Internet Access for Remote Users

To set up a secure internet access for you remote users:

  1. Define access condition. For more information, see Device Posture.

  2. Connect users by email or with Identity Provider:

    • Adding Users Manually

    • Identity Provider Settings of your organization and push the installation for seamless authentication. When your users sign in with the Identity Provider, you can install the agent by means of the Corporate enforcement tools (Microsoft SCCM, InTune, Jamf Pro).

  3. Define your internet access policy. For more information, see Internet Access.

  4. Enable full SSL inspection. For more information, see SSL Inspection.

  5. Configure Harmony Connect Agent settings for your end users. For example, you can exclude your third-party VPN servers from inspection or you can manage security when the users are at the corporate office.

  6. Observe the prevented attacks with the Cyber-Attack view.

  7. To monitor connecting users and devices, as well as cloud service locations allocated to the account, browse:

  8. Select the mode of connectivity (Internet only, corporate network only or both) for your remote users. See Connectivity Mode.

  9. Set the user authentication mode. See User Authentication Mode.

  10. See allowed and blocked services and websites on the Logs > Access Control page.

  11. To monitor specific cloud applications, see the Logs > Cloud Applications page.