Check Point Harmony Email & Collaboration provides advanced anti-phishing protection that analyzes multiple components of emails including attachments, links, sender reputation, and content patterns. This guide covers configuring anti-phishing policies to protect your organization from phishing, business email compromise (BEC), and spam attacks.
Prerequisites
Before configuring anti-phishing policies, ensure you have:
- Harmony Email & Collaboration connected to Microsoft 365 or Google Workspace
- Administrator access to the Check Point Infinity Portal
- Protection mode enabled (Detect or Prevent)
- Learning mode completed (initial calibration period finished)
Understanding Anti-Phishing Detection
The Anti-Phishing engine analyzes multiple email components:
| Component | Analysis Method |
|---|---|
| Sender Reputation | ThreatCloud database lookup, domain age, sending patterns |
| Email Headers | SPF, DKIM, DMARC validation, header anomalies |
| Content Analysis | Natural language processing, urgency indicators |
| URL Analysis | Link reputation, redirect chains, typosquatting |
| Attachment Analysis | QR codes, embedded URLs, suspicious file types |
| OCR Scanning | Text extraction from images for hidden content |
Detection Categories
| Category | Description | Risk Level |
|---|---|---|
| Phishing | High-confidence phishing attempt | Critical |
| Suspected Phishing | Lower-confidence indicators present | Medium |
| Spam | Unsolicited bulk email | Low |
| BEC/Executive Spoofing | Impersonation of executives | Critical |
Step 1: Access Anti-Phishing Configuration
- Sign in to https://portal.checkpoint.com
- Navigate to Harmony > Email & Collaboration
- Go to Security Settings in the left menu
- Click Security Engines
- Locate Anti-Phishing and click Configure
Step 2: Configure Phishing Confidence Threshold
The confidence threshold determines when emails are classified as Phishing versus Suspected Phishing.
Understanding Confidence Levels
| Threshold Setting | Sensitivity | False Positives | Detection Rate |
|---|---|---|---|
| Lowest | Most sensitive | Higher | Maximum detection |
| Low | High sensitivity | Moderate-high | Very high detection |
| Medium | Balanced | Moderate | High detection |
| High (Default) | Conservative | Low | Good detection |
| Highest | Most conservative | Minimal | Standard detection |
Set the Threshold
- In the Anti-Phishing configuration, locate Phishing confidence level
- Select your preferred threshold:
- High (Default): Recommended for most organizations
- Medium: For organizations receiving many phishing attempts
- Low: For high-security environments requiring maximum detection
- Click Save
Tip: Start with the High (default) threshold, monitor detections for 2-4 weeks, then adjust based on your organization's needs and false positive rate.
Step 3: Configure Detection Actions
Set up actions for different detection categories.
Navigate to Policy Settings
- Go to Policy in the left menu
- Click the existing threat protection policy rule or create a new one
- Select Office 365 Mail or Gmail under Choose SaaS
- Select Phishing under Choose Security
- Click Next
Configure Phishing Actions
Set actions for high-confidence phishing detections:
| Action | Description | Recommendation |
|---|---|---|
| Quarantine | Remove email, hold for review | Recommended |
| Delete | Permanently remove email | High-security environments |
| Move to Junk | Deliver to spam folder | Not recommended for phishing |
| Alert Only | Deliver with warning banner | Testing only |
- Under When Phishing is detected, select Quarantine
- Enable Notify administrator if desired
- Click Next
Configure Suspected Phishing Actions
Set actions for lower-confidence detections:
-
Under When Suspected Phishing is detected, choose:
- Quarantine: Conservative approach
- Warn with Banner: Deliver with warning message
- Move to Junk: Let users review in spam folder
-
Recommended: Select Warn with Banner to alert users while delivering
-
Click Save
Step 4: Configure Spam Detection
Spam detection works alongside anti-phishing.
Spam Action Settings
- In the policy configuration, locate Spam settings
- Configure spam actions:
- Move to Junk: Standard recommendation
- Quarantine: For strict environments
- Delete: Not recommended (may lose legitimate bulk mail)
- Click Save
Bulk Email Handling
- Go to Security Settings > Security Engines > Anti-Phishing
- Locate Bulk Email settings
- Configure:
- Treat as Spam: Marketing emails go to junk
- Allow Delivery: Marketing emails delivered normally
- Click Save
Step 5: Configure Executive Spoofing Protection
Protect against Business Email Compromise (BEC) attacks.
Enable Executive Protection
- In Anti-Phishing configuration, scroll to Executive Spoofing
- Enable Protect executives from spoofing
- Configure protection settings:
Add Executive List
-
Click Manage Executive List
-
Add executives by:
- Email address: Specific addresses to protect
- Title keywords: CEO, CFO, President, Director
- Import from directory: Sync from Microsoft Entra ID or Google Workspace
-
Click Save
Configure BEC Actions
-
Under When executive spoofing is detected:
- Quarantine: Recommended for external impersonation
- Block: Prevent delivery entirely
- Warn with Banner: Alert recipients of potential impersonation
-
Enable External sender warning for emails claiming to be from executives
-
Click Save
Step 6: Configure Microsoft/Google Integration
Manage how Harmony Email interacts with native email security.
Handle Conflicting Classifications
Configure behavior when Microsoft/Google and Check Point disagree:
- In Anti-Phishing configuration, locate Emails flagged as Spam by Microsoft / Google but Clean by Check Point
- Choose handling option:
| Option | Behavior | Use Case |
|---|---|---|
| Treat as Clean | Deliver to inbox | Trust Check Point classification |
| Treat as Spam | Deliver to Junk folder | Honor Microsoft/Google verdict |
- Click Save
Allow-List Integration
Configure how allow-lists interact between platforms:
- Scroll to Allow-List Settings
- Configure options:
- Apply Microsoft Allow-List to Check Point: Check Point honors Microsoft's allow-list
- Override Microsoft sending to Junk: Check Point can rescue emails from Microsoft's Junk folder
- Click Save
Step 7: Configure Anti-Phishing Exceptions
Create allow-lists and block-lists for specific senders.
Access Exception Settings
- Navigate to Security Settings > Exceptions
- Click Anti-Phishing
- Select exception type from dropdown: Allow-List or Block-List
Create Allow-List Entry
Allow emails from specific senders to bypass phishing checks:
- Click Add Exception
- Configure the exception:
- Name: Descriptive name (e.g., "Trusted Partner - Acme Corp")
- Match Type: Choose criteria
| Match Type | Example | Use Case |
|---|---|---|
| Sender Email | [email protected] | Specific sender |
| Sender Domain | acme.com | All emails from domain |
| Sender IP | 203.0.113.50 | Specific mail server |
| Subject Contains | "Monthly Report" | Specific email patterns |
- Click Save
Warning: Allow-list entries bypass security checks entirely. Document all exceptions and review quarterly.
Create Block-List Entry
Permanently block emails from specific senders:
-
Click Add Exception with type set to Block-List
-
Configure blocking criteria:
- Sender Email: Block specific addresses
- Sender Domain: Block entire domain
- Subject Pattern: Block emails matching subject line
-
Select Block Action:
- Phishing: Treat as confirmed phishing
- Suspected Phishing: Treat as suspected phishing
- Spam: Treat as spam
-
Click Save
Step 8: Configure User Warning Banners
Smart Banners alert users about potentially suspicious emails.
Enable Warning Banners
- Go to Security Settings > User Interaction
- Click Smart Banners
- Enable banner types:
| Banner Type | Trigger | Recommended |
|---|---|---|
| External Sender | Email from outside organization | Yes |
| First-time Sender | Sender never emailed this user | Yes |
| Suspected Phishing | Low-confidence phishing detection | Yes |
| Spoofing Attempt | Sender name doesn't match domain | Yes |
Customize Banner Appearance
- Scroll to Banner Customization
- Configure:
- Banner color: Default yellow for warnings
- Banner text: Custom warning message
- Report button: Enable "Report as Phishing" link
- Click Save
Step 9: Configure Phishing Reports from Users
Allow users to report suspected phishing emails.
Enable User Reporting
- Go to Security Settings > User Interaction
- Click Phishing Reports
- Enable Allow users to report phishing
- Configure report options:
- Report button in banner: Add report link to warning banners
- Outlook add-in: Install Check Point reporting add-in
- Gmail add-on: Install Google Workspace add-on
Handle Reported Emails
- Configure what happens when users report emails:
- Auto-quarantine: Move reported email to quarantine
- Notify admin: Send alert to administrators
- User feedback: Send confirmation to reporter
- Click Save
Phishing Simulation Integration
If using phishing awareness training:
- In Phishing Reports settings, locate Phishing simulation emails
- Enable Notify user checkbox
- Users who report simulation emails receive feedback
- Click Save
Step 10: Configure Administrator Alerts
Set up notifications for phishing detections.
Enable Phishing Alerts
- Go to Security Settings > Alerts
- Configure notification triggers:
- Phishing detected: Alert for confirmed phishing
- BEC attempt: Alert for executive spoofing
- High-volume attack: Alert for phishing campaigns
- Enter administrator email addresses
- Select alert frequency:
- Immediate: Critical events
- Hourly digest: Regular summary
- Daily digest: Once-daily overview
- Click Save
Troubleshooting Common Issues
Too Many False Positives
Symptoms: Legitimate emails flagged as phishing.
Solutions:
- Increase the phishing confidence threshold to High or Highest
- Add legitimate senders to the Allow-List
- Review flagged emails to understand detection patterns
- Contact Check Point support for pattern tuning
Missing Phishing Detections
Symptoms: Phishing emails reaching users' inboxes.
Solutions:
- Lower the phishing confidence threshold to Medium or Low
- Verify protection mode is set to Prevent (not Monitor)
- Check that the user is in a protected group
- Review sender information to add to Block-List
Smart Banners Not Displaying
Symptoms: Warning banners don't appear in emails.
Solutions:
- Verify Smart Banners are enabled in User Interaction settings
- Check that the email client supports HTML banners
- Confirm the email type triggers the configured banner
- Test with a first-time external sender
Executive Spoofing Not Detecting Attacks
Symptoms: BEC attempts not being caught.
Solutions:
- Verify executives are added to the protection list
- Check that executive spoofing protection is enabled
- Add executive title keywords (CEO, CFO, etc.)
- Review detection logs for missed attempts
Best Practices
- Start conservative: Begin with High threshold, adjust based on results
- Enable Smart Banners: Visual warnings help users identify risks
- Protect executives: Always enable BEC/spoofing protection
- Document exceptions: Track all allow-list entries with justification
- Review weekly: Check detection events and false positive reports
- Train users: Use detection data to identify training needs
- Test changes: Verify policy changes in Monitor mode before Prevent
Next Steps
After configuring anti-phishing policies:
- Configure URL protection: Enable click-time protection for malicious links
- Set up threat emulation: Configure attachment sandboxing
- Enable DLP: Protect sensitive data in outbound emails
- Review security reports: Monitor phishing trends and targeted users
Additional Resources
Need help configuring anti-phishing protection? Inventive HQ specializes in email security solutions for businesses of all sizes. Contact us for expert guidance.