Appendix A - Harmony Mobile Communication Information

This appendix describes the networking rules required to configure your security systems in order to allow the solution's integration with your on-premises systems (UEMs, syslog, and so on).

If you do not know your dashboard's region, contact Check Point Support.

To prevent spam filters from blocking Harmony Mobile's emails, allow this IP address as a sender: 167.89.59.134.

For more information on how to integrate the Harmony Mobile Protect App with different UEMs, see Harmony Mobile UEM Integration Guide.

Best Practice - The best practice when enabling firewall access for Harmony Mobile is to use DNSClosed Domain Name System. A hierarchical distributed naming system for computers, services, or resources connected to the internet or a private network. Used to translate names into IP addresses. based names. When it is not an option, use the IP addresses provided for the specified DNS in the table below.

Security System Configuration Rules

Regions:

Notes -

Policy Profiles Description

Main features:

Feature

Description

Anti-Phishing

(See Anti-Phishing).

  • This category includes URLs that typically arrive in email or messaging apps and are established to steal information from users.

  • These sites falsely represent themselves as legitimate websites to obtain users' account credentials or credit card information that can be used for fraudulent or illegal purposes.

Safe Browsing

(See Safe Browsing).

  • This category includes URLs that may be reached during on-device browsing and are established to steal information from users or install drive-by malware.

  • These sites falsely represent themselves as legitimate websites to obtain users' account credentials or credit card information that can be used for fraudulent or illegal purposes.

  • These sites falsely represent themselves as legitimate websites to install malicious apps on the user's device to root/jailbreak the device, take command-and-control of the device, and steal on-device information.

Conditional Access

(See Conditional Access).

  • This category is a list of corporate IP addresses and/or FQDN hostnames that the user's device cannot access while at high risk.

Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT.

(see Anti-Bot).

  • This category includes URLs, IP addresses, or domain names that use bots (zombies), including command-and-control sites facilitating stealing on-device personal and corporate information, record video or audio, and/or install other malicious code.

URL FilteringClosed Check Point Software Blade on a Security Gateway that allows granular control over which web sites can be accessed by a given group of users, computers or networks. Acronym: URLF.

(See URL Filtering)

  • This category allows the administrator to prohibit devices from accessing particular URLs in a specific subject category, such as gambling, guns, and violence, etc.

  • This category also allows the administrator to block domain access from the user's device irrespective of the subject category or risk level of the device.

  • In addition, this category also allows the administrator to allow domains that are always accessible to the user's device irrespective of the subject category or risk level of the device.

Parameter Configuration

  • This category allows users to configure the basic On-device Network Protection behavior (Disabled, Always on, Turn on when device is at risk.)

  • This category also includes a Configure pop-up window that allows to configure different parameters of On-device Network Protection (General settings and suspending policy for On-device Network Protection)