Harmony Mobile Protect App Operation

Harmony Mobile Protect App runs seamlessly in the background without affecting memory or performance. With this app, you get full protection from mobile threats and visibility into the current status of your Android device.

Your Android device can have two different states:

State 1 – No Threats/Policy Violations Found – Device Compliant

The main screen of the app reflects its current state. As long as the app protects your device and it is threat-free, the app main page remains Green.

My Device

Tap My Device on the bottom left of the main Harmony Mobile Protect screen to see the screen of the system settings.

Tap each setting to get more information regarding the setting.

When the Yes/No or On/Off indicator is in Green, then the setting is OK or Good. If it is Red, then the setting or configuration violates the security policyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection.. You must adjust them to make your device as secure as possible.

My Apps

Tap the My Apps icon on the bottom center of the main Harmony Mobile Protect screen to see the overview screen for all the apps on your device.

Tap each number to get the screen of the apps list aligned at the heading you selected, such as App StorePlay Apps, System Apps, Unknown Sources and so on.

You can see if there are malicious apps that Harmony Mobile discovered and you removed.

As you can see for Unknown Sources, these apps are installed as part of the Samsung Android installation. They are not downloaded from the Google Play Store.

My Network

Tap the My Network icon on the bottom right of the main Harmony Mobile Protect screen to see the list of the Wi-Fi network you currently connect to or the Wi-Fi networks you connected to in the past. It has the overview of the number networks scanned and the number of networks that exhibited suspicious activity, such as possible Man-in-the-Middle attacks.

State 2 – Threats Found – Policy Violations

On discovery of a mobile threat or policy violation, such as malware or network attack, the Harmony Mobile Protect App makes sure to report you immediately of the threat and takes measures to remove the threat.

There are two notifications methods enabled by default:

  • An on-screen pop-up or banner.

  • A notification entry in the Notification Center.

App Protection (Advanced App Analysis)

When you open the Harmony Mobile Protect App, you get information regarding the existing policy violation (threat). The section is highlighted in Red. Depending on the violation/threat, the app suggests the necessary form of mitigation.

In the example below, the Harmony Mobile Protect app discovers a suspicious app.

  1. When you tap My Apps, you see that Harmony Mobile Protect App detected one malware.

    Tap the main threat detected or the 1 THREAT DETECTED section.

    The Threat Center screen appears, which displays the tiles for all current threats.

  2. Tap the i to get threat details. In the example, the Dropbox app enters the black list of your organization, and therefore gets a warning of high risk.

  3. Tap Uninstall and then OK to remove the app.

  4. After you remove the app, the status returns to green.

  5. Tap My Apps to see that Harmony Mobile Protect app removes the history of one malicious app.

Network Protection

This section is applicable if the On-device Network Protection feature (local VPN) is enabled. The steps below demonstrate the prevention mechanism when anti-phishing is operative.


When you open the Harmony Mobile Protect App, it informs you of the existing policy violation (threat). Depending on the violation or threat, the app suggests the necessary form of mitigation.

  1. In the example, browse to the URL:
    http://threat-cloud.com/test/files/HighConfidenceBot.html
    Notice that Harmony Mobile Protect App blocks the access to this test page that simulates a malicious URL.

    Important - This URL simulates a malicious page. If you open this URL on a regular computer, it triggers the protection software installed on it.

  2. In Harmony Mobile Protect App, you see the Security Event.

  3. Tap My Network to see in Blue that one event occured. The Blue color indicates that the event is for information update only. No risk is present as the attack was prevented.

  4. Tap this event to see how the security policy applies to this threat.

  5. To view more threat details, tap the i icon on the right top corner of the tile.

Preventing SMS Phishing

SMS Phishing, also known as Smishing, is a cyber attack where attackers use Short Message ServiceClosed A Check Point service offering that helps customers with deployments or technical services for Check Point products. (SMS) to deceive individuals to reveal sensitive information, or download malicious software. The attacker sends a SMS with malicious links or attachments and prompts the user to click them.

You can use Harmony Mobile Protect App to intercept and automatically scan the SMS received on your device. To enable this feature, make sure you enable the SMS Permission setting when you install the app.

If the message is a phishing attempt, because of the Android OS limitations, Harmony Mobile notifies the user to manually delete the message.

Scanning Links

Harmony Mobile Protect App allows you to scan and submit suspicious links for analysis and provides a detailed security verdict about the link. The verdict shows the link's risk level and site categories.

You can scan the links from the Harmony Mobile Protect App or from the browser application.

To scan a link from the Harmony Mobile Protect App:

  1. Tap the three dots > Scan Link.

  2. Scan the QR code of the link or manually enter the link and tap Scan.

    The verdict screen appears.

  3. To send the report to Check Point, tap Report.

To scan a link from the browser app:

Note - This option is not available if you have set a default browser app on your device.

  1. Tap the link.

  2. Tap Scan Link.

    Harmony Mobile Protect App scans the link and shows the verdict.