POC Summary

POC Summary focuses on wrapping the POC and the tools available to confirm that the customer expectations and success criteria has been fully met and that the POC is technically closed.

Reports

Harmony Endpoint provides comprehensive pre-defined reports that offer insightful visibility into the actions taken.

Utilize the following reports to demonstrate the value:

  • Threat Analysis Report

    Use Harmony Endpoint’s Threat Analysis Report to generate a comprehensive report with the latest security events.

  • Web Activity Checkup

    Describes the web activity within the organization.

  • Vulnerability Management

    Use Harmony Endpoint's Vulnerability Management Report to reduce the attack surface, by generating a comprehensive report with the latest information regarding vulnerabilities detected by Harmony Endpoint.

  • Posture Management
    Use Harmony Endpoint's Posture Management Report to reduce the attack surface, by generating a comprehensive report with the latest information regarding vulnerabilities detected by Harmony Endpoint.

  • Operational Report

    Use Harmony Endpoint's Operational Report for insights about the operational status of your deployed endpoints.

    For more information, see Reports section in Harmony Endpoint EPMaaS Administration Guide.

Dashboard Overview

Harmony Endpoint provides comprehensive dashboards with the ability to create custom views that offer insightful visibility into the actions taken.

The Custom Dashboard allows you to create personalized dashboards with widgets of your preference. See Viewing Operational Overview, Security Overview and Reports.

Utilize the ability to create the exact information dashboard that is interesting to the customer. For example, on this custom created dashboard, we added all DLP related widgets.

Logs

Access the Logs tab to review the system and blade activity.

Due to the continuous flow of all logs, they can generate noise. Therefore, it is essential to filter the logs for the precise information we require.

During the Tuning phase of the POC, logs should be filtered for Forensics blade. This is because each incident generates automated forensic logs. Therefore, it is advisable to review only the attacks, review each generated log and better understand if the attack detected is a false plosive and needs to be excluded or the attack is real.

Global Customers

For monitoring and operational needs of large or global organizations, the best practice is to separate the different departments and/or areas into sub Infinity Portal tenants while using a parent account.

The MSSP view helps in orchestrating such functionality in a centralized manner. Contact Check Point SEs or Harmony Endpoint architects to enable MSSP views and policy profiles in your Harmony Endpoint management tenant.

A screenshot of a computer

Description automatically generated