Appendix A

Integration Information

Information Name

Description

UEMClosed Unified Endpoint Management. An architecture and approach that controls different types of devices such as computers, smartphones and IoT devices from a centralized command point./ Server URL

 

UEM Web Services URL

 

UEM API Account Username

 

UEM API Account Password

 

UEM Organization Group(s)

 

UEM Mitigation Group

 

Tag Device Status (Boolean tags)

CHKP_Status_Provisioned

CHKP_Status_Active

CHKP_Status_Inactive

Tag Device Risk (Boolean tags)

CHKP_Risk_None

CHKP_Risk_Low

CHKP_Risk_Medium

CHKP_Risk_High

Mobile Security Gateway

Security gateway servers:

Enter the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. server for your region:

Region

Server

US

gw.locsec.net

Ireland (EU region)

eu-gw.locsec.net

Australia (Asia region)

au-gw.locsec.net

Canada (Canada)

ca-gw.locsec.net

UK region (UK)

uk-gw.locsec.net

India

in-gw.locsec.net

Mobile Security App Name (iOS / Android)

Mobile Security Protect

Mobile Security App ID (iOS)

com.checkpoint.capsuleprotect

Mobile Security App ID (Android)

com.lacoon.security.fox

Deploying a CA certificate using Zero-Touch for HTTPS Traffic Inspection

  1. In your Mobile Security dashboard, go to Policy and expand your policy profile (example, Global).

  2. Click any one of these:

    • Device

    • Application

    • File

    • Network

  3. Click Network Protection.

  4. Go to HTTPS Settings and select the HTTPS Inspection checkbox.

    The Enable SSL Inspection window appears.

  5. Click Continue.

  6. In the Inspection CA section, select the CA certificate that ONP will use to inspect HTTPS traffic on the end-user device.

    Select one of these:

    • Centralized CA across several policies - Allows you to use the centralized CA certificate across several policies. To generate the centralized CA certificate, go to Settings > Central HTTPS Inspection Root CA.

      Note - If you initially chose to use a centralized CA certificate but later changed to a different CA certificate option:

      • The current policy will no longer use the centralized certificate.

      • The centralized CA certificate remains active and continues to be associated with all other policies in your account.

    • CA Certificate per policy - If your organization uses a UEM, you can generate a new CA certificate for each policy, download and deploy it on the end-user device through UEM.

      Note - Check Point recommends you renew the CA certificate at least two weeks before the expiration date. To renew the CA certificate, see sk181288.

Note - When using different policies for device groups, the enforcement of the certificate pushed by UEM Name may take up to 24 hours on iOS devices. This limitation is not relevant if you use the Global policy for the entire fleet of devices.