Configuring UEM to Deploy the Harmony Mobile Protect app

Use Microsoft Intune UEMClosed Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point. to deploy Harmony Mobile Protect app and keep the device protected. If Harmony Mobile Protect app is not installed or removed from device, the device is marked as not protected.

Notes -

  • If you configured Microsoft Intune for Allowed Apps, you must add the Harmony Mobile Protect app to the Allowed List.

  • You can only synchronize devices from the UEM to the Mobile Security dashboard. You cannot synchronize users.

  • You must add the Harmony Mobile Protect app for the iOS and for the Android operating systems.

General Workflow:

  1. If you selected Automatic integration in Configuring UEM Integration Settings, continue with Creating a Compliance Policy for the Organization Devices.

  2. If you selected Manual integration in Configuring UEM Integration Settings:

    1. Add the Harmony Mobile Protect app to your App Calatog.

    2. Configure the Application Configuration Settings.

    3. Install the Harmony Mobile Protect app on your devices.

    4. Create a compliance policy for your devices.

Adding the Harmony Mobile Protect app to your App Catalog

To protect your devices, deploy the Harmony Mobile Protect app from the public stores to your devices.

You must add the Harmony Mobile Protect app for both iOS and Android operating systems.

For more information about adding apps to the Microsoft Intune App Catalog, see the Microsoft Intune online guide.

Notes:

  • As you add the Harmony Mobile Protect app to your catalog, rename this new Mobile Device App to Harmony Mobile Protect app.

  • For Android, approve the Harmony Mobile Protect app in the managed Google Play account.

Import Mobile Security Harmony Mobile Protect to Intune:

  1. In the Microsoft Intune Admin Center, go to Apps > All Apps and click Create.

  2. On the right panel, select the App type.

Configuring the Application Configuration Settings

To auto-register the Harmony Mobile Protect app on devices to the Mobile Security dashboard, we use App Configuration Policy to send registration parameters to the device and to the Mobile Security gateway.

  1. In the Microsoft Intune Admin Center, go to Apps > All Apps > Manage apps > Configuration.

  2. Click Create and select Managed devices.

Creating a Compliance Policy for the Organization Devices

ComplianceClosed Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. Policies are activated on devices that did not install the required apps. The Harmony Mobile Protect app defines the security levels for the devices. You select the security level that marks the device as Not Compliant with company policy.

You must create separate compliance policies for specific OS types, such as iOS and Android.

Note - In every organization, the customer configures the compliance policies according to the production environment, needs, and the internal security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection..

For more information about Intune compliance policy, see the Microsoft Intune online guide.

To create a Compliance Policy:

  1. In the Microsoft Intune Admin Center, go to Devices > Manage devices > Compliance > Policies.

  2. Click Create policy.

  3. In the Create a Policy panel, select a platform.

    Note - The data fields are similar for both iOS and Android platforms.

  4. Click Create.

  5. In the Basics tab, enter a name for your policy.

  6. Click Next.

  7. In the Compliance settings tab, go to Device Health and select Require the device to be at or under the Device Threat Level as Medium (recommended).

    This setting makes your device as non-compliant if its risk level detected by the MTD app (Check Point Mobile Security) is High. The table below lists the different device threat levels:

    Device Health  Level

    Description

    Secured

    This is the most secure. The device cannot have any threats present and still access company resources. If any threats are found, the device is evaluated as non-compliant.

    Low

    The device is compliant only if Low level threats are present. Anything higher puts the device in a non-compliant status.

    Medium

    The device is compliant if the threats found on the device are Low or Medium level. If High level threats are detected, the device is determined as non-compliant.

    High

    This is the least secure. This allows all threat levels, and uses Mobile Threat Defense for reporting purposes only. Devices are required to have the MTD app activated with this setting.

  8. Click Next.

  9. In the Assignments tab, under Included groups, click Add groups.

  10. Search and select the relevant security group to apply this policy.

  11. Review and create the policy.