Settings
In the Settings tab, you can view and manage the dashboard settings, customize the detailed view of the private information for users, applications and devices.
Audit Trail
The Audit Trail screen shows the logs for the system.
You can search the audit logs by Time, Severity, Admin User, Module, Category, Event, and Event details.
Select one or more drop-down search options to produce a report of specific log entries.
-
You can filter every column in the table:
-
Click Filter above the table.
-
On the Filters pane on the right side of the window, adjust information you want to view.
-
-
You can also export the information from the table to CSV file, which will create a comma separated values file that can be opened in spreadsheet applications such as Microsoft Excel. Use filter to select the required information for the file.
If the number of audit logs exceeds 10,000, processing the data may take time. So the export is performed offline and an email is sent to the registered address with the link to download the CSV file. The link is valid for 7 days.
-
You can set the number of the rows to list on the screen, and scroll to view previous items.
Customization
Block Page
The Block Page setting allows you to customize the content displayed on the block page that appears when a user accesses a web page blocked by the organization's security policy.
To customize, go to Settings > Customization > Block Page.
|
Note - To prevent Cross-Site Scripting (XSS) attacks, the text on the Block Page is always sanitized. Any hyperlinks or URLs added to this page are displayed as plain text on mobile devices. |
To customize the block page:
-
To add the main logo, in the Main company logo section, click Upload and upload the image for the main logo. Check Point logo is the default.
Note - The height of the logo must be less than 79 pixels. Supported file types are .png and .jpeg, with a maximum size of 150KB.
-
To add the secondary logo, in the Secondary company logo section, click Upload and upload the image for the secondary logo.
Note - The height of the logo must be less than 96 pixels. Supported file types are .png and .jpeg, with a maximum size of 150KB.
-
In the Page texts section, select the language of text to be displayed on the block page and click Save.
The default language is English.
To reset to default language, click Reset and then Save.
Note - If the mobile OS is configured in an unsupported language, the block page is displayed in English.
-
Expand any of these:
-
URL Filtering, Blocked Locations and Conditional Access
-
MiTM
-
File download blocked
-
In the Title field, enter the title for the block page.
-
In the Description field, enter the reason for blocking the page.
-
To preview the changes, click Preview.
-
To reset the values to default, click Reset.
-
-
To save the page text in the current language, in the Page texts section, click Save.
Registration Templates
Registration Templates allows you to change the form of the registration email or SMS sent from the Infinity Portal to the user when they register their mobile device. This lets organizations to customize their unique corporate message for device registration.
To configure the SMS sender name, see Configuring SMS Sender Name.
You can change the default language of your email/SMS (English or Japanese) and save your template for future use:
Email template example:
SMS template example:
You can export and import registration templates:
Logo Customization
Go to Settings > Customization > Logo Customization to change the logo that appears in the upper left-hand corner of the Harmony MobileProtect App on user devices.
Privacy Settings
BYOD Privacy Mode
When you enable BYOD Privacy Mode, administrators can only see that a malicious threat exists, but they cannot see the user affected by it. This ensures the highest user privacy when needed.
BYOD Privacy Mode Disabled:
When BYOD Privacy Mode is disabled, the Events & Alerts tab shows the Device Owner and Device Number fields as configured in the Devices tab.
BYOD Privacy Mode Enabled:
When BYOD Privacy Mode is enabled, the Events & Alerts tab does not show the Device Owner and Device ID Number field.
Example:
BYOD Privacy Mode Disabled:
When BYOD Privacy Mode is disabled, the Device Details show the app(s) that put this device at high risk.
BYOD Privacy Mode Enabled:
When BYOD Privacy Mode is enabled, the Device Details does not show the app(s) that put this device at high risk. The administrator will only see that the device is at risk, and its risk level, but not the reason.
BYOD Privacy Mode Disabled:
When BYOD Privacy Mode is disabled, the drill-down into the App Analysis information about the App at Risk displays the app Owner Details.
BYOD Privacy Mode Enabled:
When BYOD Privacy Mode is enabled, the drill-down into the App Analysis information about the App at Risk does not display the app Owner Details.
Enable PII Decryption
Select this checkbox to enable the decryption of Personal Identifiable Information (PII) when you integrate with a Check Point Harmony Mobile Connector installed on-premises. For more information on Harmony Mobile Connector installation, see Harmony Mobile Connector Installation Guide.
Data Retention
In this section you can discard old alerts. It can be configured by days period or/and attack vector
Settings > Device Management name has changed to Settings > Integrations to reflect the fact that this window manages more than one type of integration with 3rd party systems. Under this window, you can manage your UEM Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point. integrations, other security posture systems such as Microsoft Defender ATP or Syslog, and SMTP servers.
Harmony Mobile supports multiple integrations simultaneously. You can integrate Harmony Mobile to several UEMs in parallel, and to external security posture system such as Microsoft Defender ATP.
When you click the +Add icon, a window pops up where you can choose to integrate Harmony Mobile with UEMs, with a Security Posture system, or with a SMTP server.
UEM Integration
|
Note - For more information on the integration procedure for different UEMs, see Harmony Mobile UEM Integration Guide. |
Select the UEMs option to integrate Harmony Mobile to any of the below supported UEMs or partner supported UEMs.
-
Workspace ONE (Formerly AirWatch UEM)
-
Microsoft Intune
-
MobileIron Core
-
IBM MaaS360
-
Citrix Endpoint Management (Formerly XenMobile)
-
MobileIron Cloud
-
BlackBerry UEM On-Premises
-
Jamf Pro
-
Google Cloud
-
Samsung Knox Manage / Samsung SDS EMM Enterprise Mobility Management. A set of tools and processes to secure and manage company-owned or employee-owned (BYOD) devices irrespective of their locations.
Integration with Partner Supported UEMs
Partner supported UEMs are the UEMs that support integration with Harmony Mobile and tested by the partner.
The partner supported UEMs are:
-
mdport solution
-
SevenPrinciples (7P)
-
Essentials MDM Mobile Device Manager. A security software that enable organizations to implement policies that secure, monitor, and manage end-user mobile devices. (Techstep/FAMOC)
-
Hexnode
-
Scalefusion
-
Codeproof
For more information, see Integration with Partner Supported UEMs.
UEM Managed and Unmanaged Devices Management
Harmony Mobile supports managing UEM managed devices and unmanaged devices on the same dashboard. You can synchronize users and devices with an UEM and simultaneously manage the manually registered users and devices on the same Harmony Mobile dashboard.
-
Different device groups must be created for the ‘Non-UEM managed Devices’ and for the ‘UEM Managed’ devices.
-
Manually registered devices must be labeled as ‘Non-UEM managed Devices’. The UEM managed devices are synchronized to their relevant groups.
Mobile Device Integration Service (MDIS) Profile
Harmony Mobile's MDIS profile communicates with iOS devices that are not managed by a third-party UEM to retrieve the list of apps installed, certificates, profiles and so on. It is installed on the device with the Harmony Mobile Protect App.
|
Note - For iOS 17.3 and higher, make sure to turn off Stolen Device Protection on the device before you install the Harmony Mobile Protect App. You can turn it on after you install the app. Otherwise, Unable to Install Profile error appears.
|
Security Posture Integration
The Security Posture option allows you to integrate Harmony Mobile to an external security posture and management system.
|
Note - The Workspace One Intelligence Hub integration requires configuring both Syslog to Intelligence Hub and Workspace One UEM. |
Syslog Integration
The administrator can set the dashboard to send Syslog events to a Syslog server. The Harmony Mobile dashboard must communicate to your Syslog server through your firewall.
To view the source IP addresses, see Appendix A - Harmony Mobile Communication Information.
For more information on the structure of the Syslog event sent by Harmony Mobile, see Appendix B - Harmony Mobile Syslogs.
To configure Syslog:
-
In the pop-up window, enter these values:
Setting
Description
Host Name
Host name or IP Address of Syslog server
Protocol
UDP or TCP
Port
Port that the Syslog server is listening on.
Syslog level
Severity level of events to send to the server.
Acceptable Values are:
-
Info
-
Warn
-
Error
-
Debug
Facility
Facility is used to specify the type of program that is logging the message. Messages with different facilities may be handled differently. Defaults to "user".
-
-
Click Apply.
Rsyslog Integration
Rsyslog is an open-source software utility used on UNIX and Unix-like computer systems for forwarding log messages in an IP network. It implements the basic syslog protocol, extends it with content-based filtering, rich filtering capabilities, flexible configuration options and adds features such as using TCP for transport and SSL Secure Sockets Layer. The standard security technology for establishing an encrypted link between a web server and a browser.\TLS Transport Layer Security. A security protocol designed to facilitate privacy and data security for communications over the Internet. for encryption.
To configure Rsyslog:
-
In the pop-up window, enter these values:
Setting
Description
Host Name
Host name or IP Address of rsyslog server
Protocol
TLS
Port
Port that the rsyslog server is listening on.
Default SSL port: 443.
Syslog level
Severity level of events to send to the server.
Acceptable Values are:
-
Info
-
Warn
-
Error
-
Debug
Facility
Facility is used to specify the type of program that is logging the message. Messages with different facilities may be handled differently. Defaults to "user".
Audit TAG
Because Harmony Mobile can send 2 formats of logs, Event logs and Audit logs, the receiving rsyslog system publishes 2 parsers for these types.
When Harmony Mobile sends an Event type it will add the Event Tag to the message.
When Harmony Mobile sends an Audit type it will add the Audit Tag to the message.
Event TAG
Because Harmony Mobile can send 2 formats of logs, Event logs and Audit logs, the receiving rsyslog system publishes 2 parsers for these types.
When Harmony Mobile sends an Event type it will add the Event Tag to the message.
When Harmony Mobile sends an Audit type it will add the Audit Tag to the message.
Chain certificate
The rsyslog server needs to publish unique certificates to establish the secure connection from Harmony Mobile.
The chain certificate is the X.509 certificate used to secure the rsyslog server. The root CA of the rsyslog system to which we are going to send logs.
Certificate
The rsyslog server needs to publish unique certificates to establish the secure connection from Harmony Mobile.
This is the certificate used for the TLS handshake. It is obtained from the rsyslog system that was generated specifically for the integration with Harmony Mobile.
Key certificate
The rsyslog server needs to publish unique certificates to establish the secure connection from Harmony Mobile.
This the Private Key certificate used for the TLS handshake. It is obtained from the rsyslog system that was generated specifically for the integration with Harmony Mobile.
-
-
Click Apply.
ArcSight Integration
To configure ArcSight:
-
In the pop-up window, enter these values:
Setting
Description
Host Name
Host name or IP Address of ArcSight server
Protocol
UDP or TCP
Port
Port that the ArcSight server is listening on.
-
Click Apply.
For more information on the structure of the ArcSight event sent by Harmony Mobile, see Appendix C - Harmony Mobile ArcSight.
WorkSpace One Intelligence Integration
Harmony Mobile supports integration with VMWARE Workspace ONE Intelligence. When connected to Workspace ONE Intelligence, the Harmony Mobile sends the security event logs (syslog) messages. It allows security/SOC administrators to use other services that run over the Workspace ONE Intelligence. These additional services can use the advanced security indicators from the Harmony Mobile that come from the organization’s mobile devices and create additional reports and insights.
For more information on Workspace ONE Intelligence refer to VMWARE Workspace ONE Intelligence WEB site.
-
Before starting to integrate Workspace ONE Intelligence, Harmony Mobile must be first integrated with Workspace ONE UEM.
-
For more information on Harmony Mobile integration with Workspace ONE Intelligence, see Integration with Workspace ONE UEM.
-
On the Harmony Mobile Dashboard, go to ‘Settings/Syslog Settings’ and select the ‘Workspace ONE Intelligence’ option.
-
Harmony Mobile sends Syslog messages to the Workspace ONE Intelligence service. You must configure the Workspace ONE Intelligence service details and verify the two systems are connected
-
When the connection is established, you can view the Harmony Mobile threats insights on the Workspace ONE Intelligence dashboards and use the powerful Intelligence platform to automate the threats handling. For example, you can create a response to a new detected malware by sending a Slack message to the group of security analysts, or use a callback to any remote service that offers a web hook API.
Microsoft Defender ATP Integration
Choosing to integrate with Microsoft Defender ATP, you will need to decide the minimum events severity to be sent to Microsoft Defender ATP and to log-in to your organization’s account of Microsoft Defender ATP. Once connected – Harmony Mobile sends all events to Microsoft Defender ATP, both security events and device activation events.
To learn more about integration with each of the 3rd party systems – please read the relevant integration guide.
To adjust the default settings implemented for their UEM, see the integration guides dedicated for each UEM.
SMTP Integration
Go to Settings > Integrations > + > SMTP to configure the dashboard to send emails from the customer’s local domain instead of using the Harmony Mobile email server.
There are two transport settings: SMTP and SMTPS.
To configure SMTP Settings:
-
Click Add.
The SMTP Settings pop-up window appears.
=
-
Select SMTP or SMTPS.
-
Enter the required information and click Save.
|
Note - You must configure the Firewall settings on the Enterprise’s firewall to allow SMTP or SMTPS from Harmony Mobile to the enterprise’s SMTP server. The allowed IP addresses are listed in Harmony Mobile Communication Information. |
Configuring SMS Sender Name
When you register users with Harmony Mobile, you can configure the sender name used in Short Message Service (SMS) messages sent to them.
The default sender name is Check Point.
To configure the SMS sender name:
-
Go to Settings > Integrations > + Add > SMS.
-
Select the Use custom SMS sender name checkbox.
-
Enter the Sender name.
-
Click Apply.
Note - This feature is supported only for these countries.
Administrators
Security Group Roles
Security Group Roles allows you to add, remove, or edit Administrator roles.
To create security group roles restricted to specific groups and policy profiles, click +New and select:
-
Role Name
-
Role between Group Security Manager and Group Security Manager Viewer
-
Select the device groups the admin can access
-
Select the policy profiles the admin can access
This new role will be available under Specific Harmony Mobile roles when creating a new Admin User in the Infinity Portal (under Global Settings).
Other admin roles are available such as Basic Support or Device Administrator. For more information about these roles, go to Settings > Administrators > Roles Definitions.
Notifications
In the Notifications tab, you can configure, how the administrator want to be alerted in case of security or audit events, dashboard announcements, product updates, scheduled mobile security reports and so on.
Roles Definitions
The Roles Definitions tab shows the different roles and their permissions in the Harmony Mobile Administrator Portal.
Announcements
Go to Settings > Announcements to view all system messages sent from Check Point.