Video Tutorials
For relevant information, see Preparing UEM Platform for Integration.
00:00: Microsoft Intune is a cloud-based service for mobile device management. This video shows how to create a security group, a user and enroll an iOS device in the Microsoft Intune Admin Center.
00:13: Access the Microsoft Intune admin center. Go to Groups, All Groups and click New group.
00:18: Enter the group details as shown and click Create.
00:21: In the Groups page, locate and click the Security Group you just created.
00:26: To assign user licenses to the Security Group, navigate to Licenses. Go to Licenses section in Microsoft 365 Admin Center. See the link on the top-right corner.
00:37: Select the Enterprise Mobility + Security E5 license.
00:42: Go to the Groups tab and click Assign licenses. On the right panel, select the security group you created and click Assign licenses.
00:50: To create a new user in the Intune Admin center, go to Users and then click New User and then select Create new user.
00:57: In the Basics tab, enter the user details and click Next.
01:01: Skip the Properties tab and click Next.
01:04: In the Assignments tab, click Add group and select your Security group. Click Select.
01:09: Click Review + Create and then click Create.
01:13: Now, create a user with Global Administrator role to grant permissions during the integration in the Harmony Mobile Administrator Portal.
01:21: Follow steps 7 to 11 to create a new user. In the Assignments tab, click Add role and select Global Administrator under Directory roles and click Select.
01:32: Click Review + create
01:35: Review the user details and click Create
01:38: Now, to enroll the iOS device for this user, install the Microsoft Authenticator App on the user's mobile device with the user credentials that you just created.
01:49: After you install the Microsoft authenticator app on the device, in the Microsoft InTune admin Center, go to devices, and iOS iPad, OS devices, and make sure the device you enrolled is listed.
02:03: Note that it could take a while to list the device. If the device is not listed enable Microsoft teams exploratory license for your group for more information, see steps 4 and 5 in this video. Now install the Microsoft teams app on the device with the user credentials and repeat this step.
02:24: Thank you for watching the video.
For relevant information, see Configuring the Mobile Security Administrator Portal UEM Integration Settings.
00:00: Microsoft Intune is a cloud-based service for mobile device management.
00:03: This video shows how to integrate Microsoft Intune in the Mobile Security
00:08: Administrator Portal, (formerly Harmony Mobile). As a prerequisite,
00:12: make sure you have configured users and devices in the Microsoft Intune Admin Center.
00:19: Log in to Check Point Portal and access Mobile Security. Go to Settings
00:23: and
00:24: Integrations. Click the + sign on the widget and select UEMs.
00:28: Select Intune and click Next.
00:31: Enter a name for the integration.
00:34: Click the first Add to my organization button to sign in to Microsoft Azure.
00:39: Sign in with your Microsoft Azure credentials. Make sure you have the Global Administrator role in the Microsoft Intune portal.
00:47: Review the permissions and click Accept.
00:50: Repeat the steps to grant permissions for iOS and Android.
00:54: Click Verify and then click Next.
00:57: In the Synchronization section, Groups field, select the groups you want to integrate
01:01: with Mobile Security.
01:02: If you use Android Enterprise, select the relevant groups.
01:06: If you use Mobile Application Management, select the MAM user groups.
01:11: In the Advanced section, select the Personally Identifiable Information to import and the interval configuration.
01:19: Click Verify and then Next
01:22: In the Deployment section, select Automatic integration and then click Deploy Now
01:27: After the integration is completed, click Finish.
01:30: The Intune UEM
Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point. pane appears on the Integrations page. Your Microsoft Intune integration is complete now.
01:37: Thank you for watching the video.
For relevant information, see Mobile Application Management (MAM) & Mobile Threat Defense (MTD) Integration.
00:00: Microsoft Intune Mobile Application Management or MAM allows organizations to force users to install the Harmony Mobile Protect app before accessing corporate apps or resources, such as Microsoft Teams, on their mobile devices. This video demonstrates how to configure a MAM policy for an iOS device in the Microsoft Intune Admin Center. As a Prerequisite, ensure users and devices are already configured in the Microsoft Intune Admin Center.
00:28: Access the Microsoft Intune admin center. To enable the Mobile Threat Defense Connector for Harmony Mobile, go to Tenant administration and then click Connectors and tokens.
00:39: Go to Mobile Threat Defense and click Create. From the list, select Check Point Harmony Mobile.
00:45: Set the values for Compliance
Check Point Software Blade on a Management Server to view and apply the Security Best Practices to the managed Security Gateways. This Software Blade includes a library of Check Point-defined Security Best Practices to use as a baseline for good Security Gateway and Policy configuration. policy and App protection policy evaluation as shown.
00:51: Now, to add a conditional policy for your device, go to Devices and then Conditional access
00:57: Click Policies and then Create new policy
01:00: Enter a name for your policy.
01:03: Under Users or agents, click users and agents selected. Under Include, select Users and groups. Search and select your Security Group and then click Select.
01:12: Under Conditions, click Conditions selected. Under Device platforms, click Not configured. In the Device platforms window, select Android and iOS and click Done.
01:22: Under Client apps, click Not configured. In the Client apps window, enable the client apps as shown and click Done.
01:29: Under Grant, click controls selected. In the Grant window, select Require app protection policy and the option for multiple controls. Then, click Select.
01:38: Turn on Enable policy and then click Create.
01:41: To create an App protection policy, go to Apps , Protection and click Create. Then, select the platform.
01:48: In the Basics tab, enter the policy name and click Next.
01:52: In the Apps tab, select the apps for which you want to enforce the MAM policy and click Next.
01:58: In the Data protection tab, enter the values as shown and click Next.
02:02: In the Access requirements tab, enter the values as shown and click Next.
02:07: In the Conditional launch tab, under Device conditions, set the Max allowed mobile threat level and click Next.
02:14: In the Assignments tab, click Add Groups, select your Security Group and click Select. After that, click Next.
02:20: Review the policy details and click Create. MAM enforces the App protection policy on your device group.
02:27: Thank you for watching the video.
For relevant information, see Integration with SOTI MobiControl UEM.
00:03: This video shows how to integrate Mobile Security, (formerly Harmony Mobile), with
00:07: SOTI MobiControl UEM.
00:11: Log into the Saudi mobicontrol web console, make sure you have the administrator
00:15: role in the portal.
00:17: Let's begin by creating a new user to do that.
00:20: Click the menu icon
00:22: Go to users and permissions.
00:25: Go to the user's Tab and click Plus.
00:28: Enter the username and password and select the roles.
00:31: You want to assign to the user. After that, click save.
00:36: Assigned the necessary permissions to the user and click save.
00:40: Next, you need to create a client ID and client Secret.
00:44: For that, click the menu icon and go to global settings.
00:48: Go to Services, API client and then click the plus icon.
00:54: Enter a name for the new API, client and click generate.
00:58: The system generates the client ID and client secret copy
01:02: and save them. Then click okay. Note that you cannot view the client
01:06: secret after closing this window. If lost, you must generate
01:10: a new API client.
01:13: Next to create a new device group, go to devices.
01:18: Click new group, new route group.
01:21: Enter a group name and click create.
01:24: Next to add devices to this group, click the menu icon and go to policies.
01:30: Go to enrollment and click new enrollment policy.
01:33: Select the device you want to add here? We show how to add an iOS device.
01:39: Enter a name for the enrollment policy and click next.
01:43: Select the enrollment type and click next.
01:47: Select, whether user authentication is required to enroll the device and then select
01:51: the device group to add the device.
01:54: Skip the auto enroll section and click next.
01:58: Click finish.
02:00: Select the required option to distribute the enrollment details and then click okay.
02:06: Now, let's configure the integration in the Mobile Security Administrator Portal
02:10: (formerly, Harmony Mobile).
02:12: Log in to Check Point Portal and access the Mobile Security Administrator Portal.
02:18: Go to Settings > Integrations.
02:21: Click add and then uems.
02:23: From the uems list, select Saudi and click next.
02:28: Enter a name for your integration in the server.
02:30: Address field enter the URL to access your Saudi mobicontrol web
02:35: console.
02:37: Enter the username and password of the user you created in the Saudi mobicontrol,
02:41: web console.
02:43: Enter the client ID and client secret generated in the Saudi mobicontrol
02:48: web console.
02:50: Click verify, and then next.
02:53: In the Synchronization section, select the device groups in SOTI MobiControl UEM
02:58: that you want to synchronize with Mobile Security.
03:01: Then, click Verify and Next.
03:04: In the tagging section, select the device characteristics that you want to communicate to
03:08: the uem. Then click verify and next
03:13: In the deployment section, copy and save the token.
03:15: Use the token value when you perform the application configuration in
03:19: the uem. Then click finish.
03:23: When the integration is complete, the Saudi mobicontrol uem
03:27: pane appears on the Integrations page,
03:30: Thank you.