Check Point Harmony Email & Collaboration includes Click-Time Protection, which rewrites URLs in emails and performs real-time security checks whenever users click links. This guide covers configuring URL protection policies, managing exceptions, and optimizing link security for your organization.
Prerequisites
Before configuring Click-Time Protection, ensure you have:
- Harmony Email & Collaboration connected to Microsoft 365 or Google Workspace
- Administrator access to the Check Point Infinity Portal
- Protection policies enabled for email scanning
- Understanding of your URL security requirements
Understanding Click-Time Protection
Click-Time Protection provides multiple security layers:
| Protection Layer | Description | When Applied |
|---|---|---|
| URL Rewriting | Replaces URLs with Check Point safe links | Email delivery |
| Reputation Check | Checks URL against ThreatCloud database | Click time |
| URL Emulation | Sandboxes suspicious URLs for analysis | Click time |
| Redirect Analysis | Follows redirect chains to final destination | Click time |
| User Tracking | Identifies users who click malicious links | After click |
Why Click-Time Protection Matters
Phishing attacks increasingly use time-delayed weaponization:
- Attacker sends email with clean URL
- Email passes initial security scans
- Attacker changes URL destination to malicious site
- User clicks link and reaches malicious content
Click-Time Protection defeats this by checking URLs when clicked, not just when delivered.
Step 1: Access Click-Time Protection Settings
- Sign in to https://portal.checkpoint.com
- Navigate to Harmony > Email & Collaboration
- Go to Security Settings in the left menu
- Click Security Engines
- Locate Click-Time Protection and click Configure
Step 2: Enable URL Rewriting
Configure which URLs are rewritten in emails.
Enable the Protection Engine
- In Click-Time Protection configuration, verify the engine is Enabled
- Configure URL rewriting scope:
| Option | Description | Recommendation |
|---|---|---|
| All URLs | Rewrite every URL in emails | Maximum protection |
| External URLs only | Skip internal domain URLs | Balanced approach |
| Suspicious URLs only | Rewrite flagged URLs only | Minimal user impact |
- Select All URLs for comprehensive protection
- Click Save
Configure URL Format
Choose the rewritten URL format:
-
Scroll to URL Format section
-
Select format version:
- V1 (Legacy):
https://protect.checkpoint.com/...?url=original - V2 (Current):
https://protect.checkpoint.com/v2/___original_url___encrypted_blob
- V1 (Legacy):
-
V2 is recommended for improved security and compatibility
-
Click Save
Step 3: Configure URL Protection Policy
Create policies that define how URL protection works.
Create a Click-Time Protection Policy
- Navigate to Policy in the left menu
- Click Add a New Policy Rule
- Under Choose SaaS, select your email platform:
- Office 365 Mail for Microsoft 365
- Gmail for Google Workspace
- Under Choose Security, select Click-Time Protection
- Click Next
Configure Policy Scope
- Rule Name: Enter a descriptive name (e.g., "URL Protection - All Users")
- Email Direction: Select scope:
- Inbound: Protect incoming emails (recommended)
- Outbound: Protect outgoing emails
- Internal: Protect internal communications
- Apply to: Select users or groups
- Click Next
Configure Link Replacement Settings
- Under Links Replacing, choose where to replace URLs:
| Location | Description | Recommendation |
|---|---|---|
| Email Body | URLs in email text and HTML | Yes |
| Attachments | URLs inside Office documents, PDFs | Yes |
| Calendar Invites | URLs in meeting invitations | Yes |
| Signature | URLs in email signatures | Optional |
- Enable all locations for comprehensive protection
- Click Next
Configure Actions
-
Under When malicious URL is detected at click time:
- Block Access: Prevent navigation to malicious site (recommended)
- Warn User: Show warning, allow user to proceed
- Alert Only: Log event but allow access (testing only)
-
Configure user notification:
- Show block page: Display explanation when blocked
- Custom message: Add organization-specific guidance
-
Click Save
Step 4: Enable URL Emulation
Configure sandbox analysis for suspicious URLs.
Access Emulation Settings
- In Security Engines, click Configure for Click-Time Protection
- Scroll to URL Emulation section
- Enable URL Emulation inspection
Configure Emulation Behavior
| Setting | Description | Recommendation |
|---|---|---|
| Emulate all URLs | Sandbox every clicked URL | Maximum security, may slow access |
| Emulate suspicious URLs | Sandbox flagged URLs only | Balanced performance |
| Emulation timeout | Maximum analysis time | 30-60 seconds |
- Select Emulate suspicious URLs for balanced protection
- Set appropriate timeout based on user tolerance
- Click Save
How URL Emulation Works
- User clicks rewritten URL
- Check Point checks ThreatCloud reputation
- If URL is suspicious or unknown:
- Opens URL in isolated sandbox environment
- Analyzes page behavior, downloads, redirects
- Checks for credential harvesting, malware delivery
- Returns verdict: Safe, Suspicious, or Malicious
- Allows or blocks user access based on verdict
Step 5: Configure URL Hiding
Prevent users from bypassing protection by extracting original URLs.
Enable URL Hiding
-
In Click-Time Protection configuration, scroll to URL Hiding
-
Enable Hide original URL from rewritten links
-
Configure hiding behavior:
- Full hiding: Original URL not visible at all
- Partial hiding: Domain visible, path hidden
-
Click Save
Why Hide URLs?
Without URL hiding, users can:
- View the rewritten URL in their email client
- Extract the original URL from the Check Point link
- Navigate directly to the original URL, bypassing protection
URL hiding encrypts the original URL, preventing manual extraction.
Step 6: Configure Click-Time Exceptions
Manage URLs that should be allowed, blocked, or ignored.
Access Exception Settings
- Navigate to Security Settings > Exceptions
- Click Click-Time
- View exception types:
- Allow-List: URLs that bypass checking
- Block-List: URLs always blocked
- Ignore-List: URLs not rewritten
Create Allow-List Entry
For trusted URLs that should bypass Click-Time checking:
-
Select Allow-List from dropdown
-
Click Add Exception
-
Configure:
- Name: Descriptive name (e.g., "Trusted Partner Portal")
- URL/Domain: Enter URL or domain pattern
- Match Type: Exact match, Contains, or Regex
-
Click Save
| Match Type | Example | Matches |
|---|---|---|
| Exact | https://portal.partner.com | Only this exact URL |
| Contains | partner.com | Any URL containing this string |
| Domain | *.partner.com | All subdomains of partner.com |
Warning: Allow-listed URLs bypass security checks. Use sparingly and document all exceptions.
Create Block-List Entry
For URLs that should always be blocked:
- Select Block-List from dropdown
- Click Add Exception
- Configure URL pattern to block
- Click Save
Block-listed URLs are blocked regardless of reputation or emulation results.
Create Ignore-List Entry
For URLs that should not be rewritten (but still scanned at delivery):
-
Select Ignore-List from dropdown
-
Click Add Exception
-
Configure:
- URL pattern: URLs to exclude from rewriting
- Reason: Document why URLs shouldn't be rewritten
-
Click Save
Common ignore-list candidates:
- Internal application URLs
- SSO/authentication redirects
- URLs that break when rewritten
Step 7: Configure User Click Tracking
Monitor which users click potentially malicious links.
Enable Click Tracking
- In Click-Time Protection configuration, scroll to User Tracking
- Enable Track user clicks on rewritten URLs
- Configure tracking scope:
- All clicks: Track every URL click
- Suspicious clicks: Track only flagged URLs
- Malicious clicks: Track only blocked URLs
View Click Analytics
- Navigate to Reports > Click Analytics
- View metrics:
- Total clicks on rewritten URLs
- Clicks by threat verdict (safe, suspicious, malicious)
- Users with most malicious clicks
- Click patterns over time
Identify High-Risk Users
Use click tracking to identify users who need security training:
- Go to Reports > User Risk
- Sort by Malicious Link Clicks
- Export list for security awareness training
Cookie-Based Identification
Click-Time Protection uses browser cookies to track users:
- When user clicks a rewritten URL, a cookie is placed
- Subsequent clicks within 30 days are linked to that user
- All future clicks within 365 days are attributed to the user
- Provides accurate tracking even for shared or forwarded emails
Step 8: Configure Protection for Collaboration Tools
Extend URL protection beyond email.
Microsoft Teams
- Go to Policy > Add a New Policy Rule
- Select Microsoft Teams under Choose SaaS
- Select Click-Time Protection under Choose Security
- Configure URL replacement for:
- Chat messages
- Channel posts
- Meeting invites
- Click Save
SharePoint and OneDrive
- Create policy rule for OneDrive or SharePoint
- Enable Click-Time Protection
- URLs in shared documents are rewritten
- Protection applies when documents are opened or downloaded
Google Drive and Chat
- Create policy rules for Google Workspace apps
- Enable URL protection for:
- Google Chat messages
- Google Docs links
- Calendar event URLs
Step 9: Test Click-Time Protection
Verify URL protection is working correctly.
Send Test Emails
-
Send an email containing various URL types:
- External website link
- Internal application link
- Known safe URL
- Suspicious/test URL
-
Verify URLs are rewritten in received email
-
Click rewritten URLs and verify protection:
- Safe URLs: Transparent redirect to destination
- Suspicious URLs: May see brief analysis page
- Malicious URLs: Block page displayed
Verify Click Logging
- Go to Events > Click-Time Protection
- Filter for recent activity
- Verify test clicks appear in event log
- Review event details:
- Original URL
- User who clicked
- Verdict (safe, suspicious, malicious)
- Action taken
Troubleshooting Common Issues
URLs Not Being Rewritten
Symptoms: URLs appear in original form in delivered emails.
Solutions:
- Verify Click-Time Protection policy is enabled
- Check policy scope includes the affected users
- Confirm URL location (body, attachment) is enabled
- Verify URL isn't on the Ignore-List
- Check if email is from an internal sender (may be excluded)
Legitimate URLs Being Blocked
Symptoms: Safe URLs are incorrectly blocked.
Solutions:
- Check if URL is flagged in ThreatCloud (false positive)
- Add URL to Allow-List for immediate resolution
- Report false positive to Check Point for database correction
- Review emulation results for the URL
Slow URL Access
Symptoms: Clicking rewritten URLs takes a long time.
Solutions:
- Check if URL emulation is enabled for all URLs
- Consider emulating only suspicious URLs
- Reduce emulation timeout setting
- Verify network connectivity to Check Point cloud
Rewritten URLs Breaking Applications
Symptoms: Certain applications don't work with rewritten URLs.
Solutions:
- Identify the problematic URL pattern
- Add to Ignore-List to exclude from rewriting
- Test application functionality after exclusion
- Document exclusion with security justification
Best Practices
- Enable for all users: Apply URL protection organization-wide
- Protect all locations: Include email body, attachments, and calendar
- Use URL hiding: Prevent users from extracting original URLs
- Monitor click analytics: Identify users needing security training
- Document exceptions: Track all allow-list and ignore-list entries
- Review monthly: Audit exceptions and click patterns
- Test regularly: Verify protection is working as expected
Next Steps
After configuring Click-Time Protection:
- Configure threat emulation: Enable attachment sandboxing
- Set up anti-phishing: Configure phishing detection policies
- Enable DLP: Protect sensitive data in URLs
- Review security reports: Monitor URL threat trends
Additional Resources
Need help configuring URL protection? Inventive HQ provides expert email security implementation services. Contact us for a security assessment.