Check Point Harmony Mobile provides comprehensive mobile threat defense through configurable policies that protect against network attacks, malicious applications, and device vulnerabilities. This guide covers creating and configuring threat defense policies to secure your mobile fleet while maintaining user productivity.
Prerequisites
Before configuring threat defense policies, ensure you have:
- Harmony Mobile deployed to your organization's devices
- Administrator access to the Check Point Infinity Portal
- Device groups created for policy assignment
- Understanding of your security requirements and risk tolerance
- UEM/MDM integration configured (optional, for Conditional Access)
Understanding Harmony Mobile Protection
Harmony Mobile provides protection across multiple threat vectors:
| Protection Layer | Threats Addressed |
|---|---|
| Network Protection | MitM attacks, rogue WiFi, SSL stripping, network exploits |
| Application Security | Malware, spyware, PUPs, vulnerable apps |
| OS Protection | Jailbreak/root detection, OS vulnerabilities, risky configurations |
| Anti-Phishing | SMS phishing (smishing), malicious URLs, social engineering |
Step 1: Access Policy Configuration
- Sign in to https://portal.checkpoint.com
- Navigate to Harmony > Mobile
- Go to Policy in the left menu
- You'll see the default policy and any custom policies you've created
Step 2: Configure Network Protection
Network protection detects and prevents network-based attacks.
Access Network Protection Settings
- In the Policy section, click on your policy (or the default policy)
- Click Network Protection to expand settings
Configure WiFi Protection
Protect against rogue and malicious WiFi networks:
-
Rogue Access Point Detection
- Enable Detect rogue corporate WiFi
- Configure the risk level when detected:
Risk Level Effect Low Logged only Medium User notification High Conditional Access triggered - Click Save
-
Unsecured WiFi Warning
- Enable Warn on unsecured WiFi
- Configure notification settings
- Users will be alerted when connecting to open networks
-
Network Blacklist
- Add specific SSIDs to block
- Useful for known malicious networks or competitor networks
- Enter SSID names to blacklist
Configure Port Scan Detection
Detect reconnaissance attempts against mobile devices:
- Navigate to Network > WiFi Network > Port Scan Settings
- Enable Alert on Port Scanning
- Select the device risk level for port scan detection:
- Low: Informational only
- Medium: User notification
- High: Trigger Conditional Access
- Click Save
Configure HTTPS Inspection
Enable deep packet inspection for encrypted traffic:
- Go to Network Protection > HTTPS Settings
- Enable HTTPS Inspection checkbox
- Under Inspection CA, select:
- Central CA for UEM Deployment: Same CA across all devices (recommended)
- CA Certificate per device: Unique CA for each device
- If using Central CA:
- Click Generate CA Certificate
- Download and deploy via MDM
- Click Save
Note: HTTPS inspection requires the CA certificate to be trusted on devices. Deploy via MDM for seamless user experience.
Configure On-Device Network Protection (ONP)
Enable network protection without routing traffic through a VPN:
- Go to Network Protection > On-Device Network Protection
- Enable ONP for lightweight protection
- Configure:
- Malicious URL blocking: Block known phishing and malware URLs
- Anti-bot protection: Detect command-and-control communications
- ThreatCloud intelligence: Use Check Point threat feed
Step 3: Configure Application Security
Protect against malicious and risky applications.
Access Application Settings
- In your policy, click Application Security to expand
- Configure settings for application protection
Configure Malware Protection
-
Malware Detection
- Enable Scan for malware
- Configure scan triggers:
- On app install
- On app update
- Periodic background scan
- Set risk level for malware detection: High (recommended)
-
Malware Actions
- Configure response when malware is detected:
Action Description Alert only Notify user and admin Quarantine Isolate the app Block Prevent app from running - Click Save
- Configure response when malware is detected:
Configure Potentially Unwanted Programs (PUP)
- Enable Detect potentially unwanted programs
- Configure risk level (Medium recommended)
- Define categories to detect:
- Adware
- Spyware
- Remote access tools
- Rooting/jailbreak tools
Configure App Vulnerability Scanning
- Enable Detect vulnerable applications
- Harmony Mobile will identify:
- Apps with known CVEs
- Outdated app versions
- Apps with dangerous permissions
- Configure risk level based on vulnerability severity
Configure App Reputation
- Enable App reputation checking
- Harmony Mobile uses ThreatCloud to verify:
- App publisher reputation
- App behavior analysis
- Community risk ratings
- Configure actions for low-reputation apps
Step 4: Configure OS Protection
Detect and respond to device operating system risks.
Access OS Protection Settings
- In your policy, click OS Protection to expand
- Configure device-level security settings
Configure Jailbreak/Root Detection
-
iOS Jailbreak Detection
- Enable Detect jailbroken devices
- Set risk level: High (recommended for corporate devices)
- Actions: Alert, block corporate resources, or both
-
Android Root Detection
- Enable Detect rooted devices
- Set risk level: High
- Configure response actions
Configure OS Version Policy
- Enable OS version compliance
- Define minimum supported versions:
- iOS minimum: 15.0 (or your requirement)
- Android minimum: 11.0 (or your requirement)
- Set risk level for outdated OS:
- Low: Advisory only
- Medium: User notification
- High: Block corporate access
- Click Save
Configure Risky Configuration Detection
Detect device settings that increase risk:
- Enable Detect risky configurations
- Configure detection for:
- Developer mode enabled
- USB debugging enabled (Android)
- Unknown sources enabled (Android)
- Screen lock disabled
- Set risk levels for each configuration
Step 5: Configure Anti-Phishing Protection
Protect users from phishing attacks across multiple channels.
Configure SMS Phishing Protection (Android)
- Navigate to Network > SMS Phishing
- Enable Enable SMS Phishing Protection checkbox
- Configure:
- URL scanning: Check links in SMS messages
- ThreatCloud lookup: Verify URLs against threat intelligence
- Click Save
Recommendation: Enable both ONP (On-device Network Protection) and SMS Phishing Protection for comprehensive URL protection.
Configure URL Filtering
- Go to Network Protection > URL Filtering
- Enable URL filtering
- Configure blocked categories:
- Phishing sites
- Malware distribution
- Command and control servers
- Newly registered domains (optional)
- Configure risk levels for each category
Configure Safe Browsing
- Enable Safe browsing warnings
- Users will receive warnings when:
- Visiting known phishing sites
- Clicking suspicious links in apps
- Accessing risky URLs from any app
Step 6: Configure Risk Levels and Actions
Define how different risk levels affect device status and access.
Understanding Risk Levels
| Risk Level | Description | Typical Response |
|---|---|---|
| Low | Minor concern, informational | Log event, optional notification |
| Medium | Moderate risk, action recommended | User notification, advisory |
| High | Significant risk, immediate action | Block access, mandatory remediation |
| Critical | Severe threat, device compromised | Full lockdown, isolate device |
Configure Conditional Access Integration
For Microsoft Intune integration:
-
In Harmony Mobile, go to Settings > Device Management
-
Verify Microsoft Intune is configured
-
Go to Policy > Conditional Access
-
Map risk levels to access decisions:
- Low risk: Full access
- Medium risk: Access with warnings
- High risk: Limited access (email only)
- Critical risk: No access
-
In Microsoft Intune:
- Create a device compliance policy
- Add Require the device to be at or under Device Threat Level
- Select maximum allowed threat level
- Assign to user groups
Configure Admin Alerts
- Go to Settings > Alerts
- Configure alert triggers:
- High-risk events
- Malware detections
- Device compromise
- Set alert recipients (admin email addresses)
- Configure alert frequency (immediate, daily digest, etc.)
Step 7: Create Custom Policies
Create different policies for various user groups.
Create a New Policy
- Go to Policy in Harmony Mobile
- Click Add Policy or Create New Policy
- Enter a policy name (e.g., "Executive Devices - Strict")
- Configure settings specific to this group:
- More restrictive for executives
- Balanced for general employees
- Monitoring-only for contractors
Policy Configuration Examples
Executive Policy (Strict):
| Setting | Configuration |
|---|---|
| Network Protection | All enabled, High risk |
| HTTPS Inspection | Enabled |
| Malware Detection | Block immediately |
| Jailbreak/Root | High risk, block access |
| OS Compliance | Current version required |
Standard Employee Policy (Balanced):
| Setting | Configuration |
|---|---|
| Network Protection | Enabled, Medium risk |
| HTTPS Inspection | Optional |
| Malware Detection | Alert and quarantine |
| Jailbreak/Root | High risk, alert |
| OS Compliance | N-1 version allowed |
Contractor Policy (Monitoring):
| Setting | Configuration |
|---|---|
| Network Protection | Monitor only |
| HTTPS Inspection | Disabled |
| Malware Detection | Alert only |
| Jailbreak/Root | Alert only |
| OS Compliance | Advisory |
Assign Policies to Groups
- Go to Devices > Groups
- Select a device group
- Click Assign Policy
- Select the appropriate policy
- Click Save
Step 8: Test Policy Configuration
Verify policies work as expected before full deployment.
Test Network Protection
- On a test device, connect to an unsecured WiFi network
- Verify warning appears (if configured)
- Check event logged in dashboard
Test Malware Detection
- Download the EICAR test file (safe test malware)
- Verify Harmony Mobile detects and handles it
- Check device risk level changed appropriately
Test Conditional Access
- Manually set a test device to high risk
- Attempt to access corporate resources
- Verify access is blocked (if Conditional Access configured)
- Clear the risk level and verify access restored
Troubleshooting Policy Issues
Policies Not Applying
Symptoms: Devices not following configured policy settings.
Solutions:
- Verify device is assigned to a group with the correct policy
- Check device has synced recently (force sync from app)
- Confirm policy changes are saved
- Restart the Harmony Mobile app on the device
False Positive Detections
Symptoms: Legitimate apps or activities flagged as threats.
Solutions:
- Review the detection in the Events log
- If false positive, add to whitelist/exceptions
- Adjust sensitivity settings for that threat category
- Report false positive to Check Point support
Conditional Access Not Triggering
Symptoms: High-risk devices still accessing corporate resources.
Solutions:
- Verify UEM integration is properly configured
- Check Conditional Access policy is assigned in UEM
- Confirm risk level mapping is correct
- Verify device is enrolled in UEM and Harmony Mobile
Best Practices
- Start with monitoring: Enable detection without blocking initially
- Gradual enforcement: Increase protection levels over time
- User communication: Explain why protections are in place
- Regular review: Audit events and adjust policies monthly
- Test changes: Always test policy updates on a pilot group
- Document exceptions: Track any whitelisted apps or networks
- Stay updated: Keep threat definitions and app versions current
Next Steps
After configuring threat defense policies:
- Monitor dashboard: Review threat trends and device compliance
- Set up reporting: Schedule regular security reports
- Integrate SIEM: Forward events to your security operations center
- Train users: Educate on responding to security alerts
- Review and refine: Adjust policies based on operational experience
Additional Resources
- Harmony Mobile Policy Documentation
- Network Protection Configuration
- Microsoft Intune MTD Integration
- Miercom 2025 MTD Assessment Results
Need expert help with mobile security? Inventive HQ specializes in enterprise mobile threat defense deployments and policy optimization. Contact us for a security assessment.