Installation and Deployment

Technical Prerequisites

  1. Harmony Endpoint Management Platform service is registered and up:
    Check Point Infinity Portal

    (Note the data residency selection - EU, US, UAE, and so on).

  2. Proper EVAL licensing per the expected features are attached to the tenant (For example, Harmony Endpoint Elite includes Posture Management, DLP, and Infinity XDR/XPR).

  3. Harmony Endpoint clients are deployed and communicating with the management portal. See Connectivity Requirements.

  4. Anti-MalwareClosed A component of the Endpoint Security client that protects against known and unknown viruses, worms, Trojan horses, adware, and keystroke loggers. blade is enabled and updated for latest signatures.

  5. The logs are generated and monitored through the Logs tab.

  6. Browser extension is enabled and running on supported browsers (Microsoft Edge, Chrome, Firefox, Safari, Brave).

Connectivity Requirements

URLs and Ports

  1. Outbound network connectivity between clients and the Endpoint Management tenant platform over port 443.

  2. Clients should have uninterrupted Internet access per sk116590. Explicit allow rules and HTTPS decryption exclusions by destination FQDNs should be configured on the customer firewall and proxy.

  3. To verify the connectivity, a connectivity test executable script is available on the client in this location:

    C:\Program Files (x86)\CheckPoint\Endpoint Security\Endpoint Common\bin\CheckConnectivity.exe

Proxy, Semi-Isolated Environments and Super Nodes

If required, you can configure authenticated proxy under Client Settings policy > General settings. The customer can create a service account and specify its credentials in Harmony Endpoint policy.

A Super Node is a Windows machine running a specially configured Endpoint Security Client that also provides updates and client proxy services. It listens on port TCP/4434 and port TCP/3128 by default. Super Node is a light-weight proxy (based on NGNIX) that allows admins to reduce network bandwidth consumption and enable offline updates where only the Super Node needs connectivity to the management and update servers.

A diagram of a network

AI-generated content may be incorrect.

Note - Sizing recommendation:

4 CPU cores and 32GB of RAM per each 1000 concurrent client sessions.

Platform-Specific Support and Exclusions

VDI and Terminal Servers

Windows Servers

Rule base

Servers are more complicated endpoints than workstations and demand a different treatment. Create different rules for different server roles as in the following example:

A screenshot of a computer program

Description automatically generated

There are separate rules for DCs, Exchange Servers, RAS and IAS servers, and so on.

Note - Do not apply a single policy to all servers. It may create unnecessary exclusions and unwanted performance reduction.

  • Server Optimization

    Each server role needs to be treated differently.Turn on server optimization and add the relevant role to optimize performance. See sk179816.

  • Exclusions

    Every zero-day product needs to have exclusions set for it to function properly.

    • Using Smart Exclusions

    • Create exclusions based on real events in logs:

      1. Right-click on a log you want to exclude.

      2. Choose to create exclusion for all rules/effective ruleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session..

    • In case of another security product running alongside with Harmony Endpoint (For example, third-party DLP, VPN clients), it is recommended to configure mutual exclusions.

    • Trusted third-party security software can be excluded from all supported capabilities by software developer certificate CN (see vendor executables properties).

    • Make exclusions in forensic monitoring with caution. Forensic monitoring exclusions help to reduce performance impact, but it also means that relevant process operations will not be recorded and will be missing in forensic reports and threat hunting.

    • Harmony Endpoint processes and infrastructure on Windows can be excluded by Check Point signer certificate CN (see Harmony Endpoint executables properties) and/or following directories:

      • C:\Program Files (x86)\CheckPoint\Endpoint Security\

      • C:\ProgramData\CheckPoint\Endpoint Security\

      • *:\HarmonyBackup\

        The * wildcard indicates that the system creates an Anti-Ransomware backup folder on all disk volumes and external media.

OS Support

For the list of features (blades) per OS for Harmony Endpoint, see sk169996.

Onboarding and Deployment

The deployment of Harmony Endpoint varies from different organization based on their license, specific needs, and hardware resources. There are various ways to install and distribute Harmony Endpoint.

POC (Pilot) Groups

Different environments have different needs. Therefore, Harmony Endpoint needs to be adjusted to the customer’s environment and be configured differently in each environment.

First, create a POC (pilot) group which is a pre-selected group of devices used for running the deployment. In the pilot group, we perform the customization and the fine-tuning. After everything is configured and adjusted to the environment, proceed to the next step.

The POC group should include one device of each department/user role (one device from R&D, Finance, IT, and so on). The reason is that Harmony Endpoint needs to be adjusted to all different behaviors. If we use only IT devices in the POC, Harmony Endpoint policy and exclusions will not be customized and adjusted for each department, potentially leading to avoidable issues.

However, Servers need to be treated differently than workstations. Therefore, put servers in their own designated POC groups by their server role (Exchange, DCs). It is recommended to start deploying Harmony Endpoint security clients in Test server farms before Production.

Order of Deployment

Note - AD scanner, Super Node and remote Deployment Agent roles can be combined on a pair of dedicated virtual machines operating 24/7 and serving other Harmony Endpoint clients protecting customer machines.

Onboarding

There are two types of on-boarding groups:

  1. The Staging/Pilot Groups should be used in the initial policies enforced on pilot machines.

  2. The Entire Organization Group includes the rest of machines in the production environment.

The main idea is to test Harmony Endpoint on the devices of a certain behavior and adjust the products based on their behavior. Once it is ready, deploy it to the rest of the devices of the same behavior.

Note - Each server role requires its own pilot group and configuration policy, as each role has distinct behavior, the services it utilizes, and the access it requires.

Deployment by Tiny Agent (aka Initial Client) vs Exported Package

There are two installation packages available:

  • Tiny Agent

  • Exported packages

Note - Both Tiny Agent and Exported packages support pre-assignment to Virtual Groups.

It is a good add-on or alternative to AD/Entra-ID org. structure.

Creating empty virtual groups and their assignment to downloaded installation packages help to organize machine groups properly and use them in Threat Protection and Software Deployment policies.

If you have multiple virtual groups, you can export the same installation package multiple times while assigning it to different virtual groups.

Thus, once deployed, Harmony Endpoint clients will automatically join relevant pre-assigned virtual groups and start enforcing relevant policy rules.

Tiny Agent (aka Initial Client)

The installation file is lightweight (less than 1MB) and includes the initial client only (without the rest of the capabilities).

Once the client is installed and the connection to the management is established, the system downloads and installs the engines from the management to the client side.

Recommended for:

  • POC on several test machines.

  • Newly created and roaming workstations (desktops/laptops/BYOD).

Not recommended for:

  • Massive rollout in offices and datacenters. Opt for complete exported package to avoid excessive bandwidth consumption.

  • Sensitive/business-critical machines (servers, C-level devices, data centers).

  • Semi-isolated and air-gapped environments.

To download:

  1. Go to Harmony Endpoint Administrator Portal and do one of these:

    • In the Overview tab, go to Unified Dashboard and click Download Endpoint.

    • Go to Policy > Software Deployment.

  2. Click Download.

    The following screen appears.

  3. Choose one of these:

    • To download the initial client installation to this device

    • To copy a download link

    • To send installer link by email

    Note - Choose the same version you are using in the Software Deployment section.

Full Exported Package

It is a customizable installation file of the agent. You can choose the capabilities to be included in the installation file. Unlike the initial package, it does not depend on network connectivity to be fully installed. The installation file is a few hundred megabytes in size.

Recommended for:

  • Massive rollout in offices and datacenters via GPO, SCCM, UEM (Microsoft Intune, VMware Workspace One, JAMF).

  • Sensitive/business-critical machines (servers, C-level devices, data centers).

  • Semi-isolated and air-gapped environments when Client Settings policy must be included into the installation package.

To download:

  1. Go to Harmony Endpoint Administrator Portal.

  2. Go to Policy > Export Package > Endpoint Client.

  3. Click the + sign and start creating your own custom installation package.

  4. Choose a name, OS and a version.

    Note - Choose the same version as in the software deployment.

  5. Choose the capabilities to be installed.

  6. (Optional) Add a virtual group (recommended when AD/Entra-ID org. structure is not sufficient) and VPN sites (Check Point Quantum Gateway addresses).

    A screenshot of a computer

AI-generated content may be incorrect.

  7. Select the Minimize package size checkbox to minimize the installation package size by removing redundant components, include AV signatures.

  8. Under General settings, disable the Endpoint Security ClientClosed Application installed on end-user computers to monitor security status and enforce security policies. user interface for unattended machines, such as ATMs. It saves some CPU and RAM on low-spec machines. See sk133174.

  9. Under Dependencies settings, select the required components:

  10. Under Anti-Malware settings, select the signatures to be included in the package.

    A screenshot of a software

AI-generated content may be incorrect.

  11. Click Finish.

The installation file is now ready for use. Optionally, EXE can be converted to MSI.

AD and Entra-ID Integration

See Directory Scanner page in Harmony Endpoint EPMaaS Administration Guide.

Deployment via Microsoft Intune UEM

See Deploying Harmony Endpoint Using Microsoft Intune.