CP Harmony Browse AdminGuide
CP Harmony Browse AdminGuide
HARMONY BROWSE
Administration Guide
Check Point Copyright Notice
© 2021 - 2024 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and
distributed under licensing restricting their use, copying, distribution, and decompilation. No
part of this product or related documentation may be reproduced in any form or by any means
without prior written authorization of Check Point. While every precaution has been taken in
the preparation of this book, Check Point assumes no responsibility for errors or omissions.
This publication and features described herein are subject to change without notice.
TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party
licenses.
Revision History
Revision History
Date Description
15 October Added Incognito Mode settings to the Advanced Browser Settings in "Web
2024 and Files Protection" on page 57.
10 October Added Managing Microsoft Sensitivity Labels for DLP in "Data Loss
2024 Prevention" on page 107.
13 February Added Browser Status to the Table Filters and Column Description. See
2024 "Viewing Computer Information" on page 42.
22 November Added video tutorial for "Upload Emulation " on page 58.
2023
17 October Added:
2023
n "Upload Emulation " on page 58.
n "Upload Protection" on page 70.
n "Block Upload by Domain" on page 72.
Date Description
31 July 2023 Added Disable Notifications. See "Credential Protection" on page 74.
24 July 2023 Added "Upgrading the Harmony Browse Client (Windows only)" on
page 27.
23 May 2023 n Added support for Brave and Edge browsers on macOS. See
Browser settings in "Web and Files Protection" on page 57 and the
OS, browser, feature compatibility matrix table "Introduction to
Harmony Browse" on page 14.
n Added new features:
o Sending monthly security reports. See "Sending Security
14 February Added information about the new feature; Policy Mode. See "Configuring
2023 the Threat Prevention Policy" on page 51.
31 January n Added information about the new feature; Scan local HTML files.
2023 See "Credential Protection" on page 74.
n Added information about the new event; Accessing a local HTML
file. See "User Interface - Customized Browser Block Pages" on
page 50.
Date Description
04 November n Added supported file types for Threat Emulation. See "Download
2022 Emulation and Extraction" on page 57.
n Data residency is now supported for Australia, India and United
Kingdom. See Registering to the Infinity Portal.
27 October n Added information about the new feature; Malicious Script Protection.
2022 See "Malicious Script Protection" on page 64 and "Introduction to
Harmony Browse" on page 14.
n Search reputation is now supported with Bing and Yahoo search
engines. See "Web and Files Protection" on page 57.
16 August Added support for the Brave browser on Windows. See "Introduction to
2022 Harmony Browse" on page 14 and "Deploying Harmony Browse Clients" on
page 22.
25 July 2022 n Added information about support for Threat Emulation appliance. See
"Download Emulation and Extraction" on page 57.
n Added sk179690 to verify whether the Harmony Browse client can
access the Check Point services and the stores of extensions. See
"Deploying Harmony Browse Clients" on page 22.
13 July 2022 n Added information about the new "Web and Files Protection" on
page 57.
n Added three new options for "Web and Files Protection" on page 57.
05 June 2022 Added steps for installing the Harmony Browse extension for Safari. See
."Deploying Harmony Browse Clients" on page 22.
Date Description
1 February Updated:
2022
n Introduction
n Creating a New Harmony Browse Management Service
n Configuring Harmony Browse Policy
n Configuring Client Settings Policy
Removed:
n Configuring Client Settings
n Viewing Harmony Browse Logs
30 January Added:
2022
n Managing Users in
Updated:
n Introduction
n Viewing Computer, Operational and Security Information
n Web and Files Protection
Removed:
n Viewing Operational and Security Information
25 January Updated
2022
n Viewing Computer Information
n Adding Exclusions to Rules
n Managing Scanners
n Managing Virtual Groups
Removed:
n Active Directory Authentication
n Recent Tasks
16 January Updated:
2022
n Configuring Harmony Browse Policy
11 January Updated:
2022
n Client User Interface Settings
Date Description
9 January Added:
2022
n Harmony Browse Logs
Updated:
n Configuring Threat Prevention Policy
n Web and Files Protection
n Adding Exclusions to Rules
2 January Updated:
2022
n Managing Licenses in the Cloud
n Web & Files Protection
12 December Updated:
2021
n Introduction
n Deploying Endpoint Clients
n Configuring Harmony Browse Policy
n Configuring Global Policy Settings
n Web & Files Protection
n Adding Exclusions to Rules
Removed:
n Manual Deployment of Endpoint Clients
n Adding a New VPN Site to an Exported Package
n Monitoring Deployment and Policy
n Performing Push Operations
10 November Updated:
2021
n Active Directory Authentication
04 November Updated:
2021
n Active Directory Authentication
Table of Contents
Revision History 3
Introduction to Harmony Browse 14
Getting Started 16
Creating an Account in the Infinity Portal 16
Accessing the Harmony Browse Administrator Portal 17
Managing Licenses 19
User Center 19
Activating the License 21
Deploying Harmony Browse Clients 22
Upgrading the Harmony Browse Client (Windows only) 27
Creating a New Harmony Browse Management Service 28
Managing Users in Harmony Browse 29
Managing Accounts in the Infinity Portal 32
Viewing Dashboard and Reports 33
Dashboard 33
Custom Dashboard 33
Creating a Custom Dashboard 34
Managing a Custom Dashboard 36
Reports 36
Generate Report 37
Scheduled Reports 38
Announcements 41
Viewing Computer Information 42
Asset Management View 42
Creating a Custom View 42
Status Icon 43
Filters 43
Emulation Environments 65
Override Default File Actions 65
Download Protection 66
Supported Files 67
Download Emulation Actions 69
Unsupported Files 70
Custom Settings 70
Download Emulation and Extraction 70
Upload Protection 70
Upload Emulation Actions 71
Block Upload by Domain 72
Credential Protection 74
Browser Settings 75
Pin Extension 75
Windows 75
macOS 75
Control Browser Notifications 75
Incognito Mode 76
Adding Exclusions to Rules 76
Legacy Exclusions 76
Adding Exclusions to a Specific Rule 76
Adding Global Exclusions 77
Adding a New Exclusion to an Exclusion Category 77
Editing an Exclusion 78
Smart Exclusions 81
Adding Exclusions to a Specific Rule 82
Adding Global Exclusions 90
Migrating Legacy Exclusions 98
Importing and Exporting Exclusions 99
Managing Exclusions 100
Blo
Thre
ck Malic
UR at Saf Data
Uplo Upl Pass Sear ious
Bro L Extra Zero e Loss
ad oad word ch Scrip
OS wse Filt ction Phis Se Prev
Emul by Reus Repu t
r erin and hing arc entio
ation Do e tation Prote
g Emul h n
mai ction
ation
n
Wind Chrom Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
ows e
Edge Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Chrom
ium
Brave3 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
mac Chrom Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
OS e
Brave3 Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Edge Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
Chro Chrom Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
meO e
S
Notes -
1 By default, the extension is disabled. To enable the extension, see Deploying
Harmony Browse Clients.
2 Browser extension is supported in Safari version 14 and higher.
3 Browser extension is supported in Brave version 1.43.89 and higher.
Getting Started
To get started with Harmony Browse:
1. Create an account in Infinity Portal
2. Accessing the Harmony Browse Administrator Portal
3. Managing Licenses
4. Creating a New Harmony Browse Management Service
5. Deploying Harmony Browse Client
4. If you are accessing the portal for the first time, do one of these:
n If you already have a Check Point contract, click Already have a contract? to
attach the contract to the product. For more information, see Associated Accounts
in the Infinity Portal Administration Guide.
n If you want to trial the product, click Start free trail.
If you have already attached the contract with the product, the Overview page appears.
Harmony Browse creates the endpoint management service automatically.
Managing Licenses
User Center
When you create an account in the Infinity Portal and access the service, you get a free 30-day
trial. After the 30-day trial period, you must purchase a software license to use the product. To
purchase a license, you must create a Check Point User Center account.
Once you create a User Center account, contact your Check Point sales representative to
purchase a license.
To extend the trial period
2. If you do not have a User Center account, go to My Check Point > My accounts and
create a new User Center account.
3. Go to My Check Point > Product Center.
4. In the Product Center, go to the Evaluations tab.
5. Select Other Evaluation Option and click Select a product.
The Other Evaluation Options window opens.
6. Select Harmony Browse - CP-HAR-BROWSE-EVAL from the drop-down list and
click Select.
7. Click Next
8. In the Provide Evaluation Info section that opens, fill in these details:
10. In the Product Center, go to Selected Account and select the account to which the
license was added.
11. Select the license and click the License button above the list of the licenses.
12. Under License Information, select the License for Cloud Management checkbox.
Note- If you already have an associated account and wish to add another
license, go to Global Settings > Service and Contracts. At the upper-right of
the screen, click Manage Accounts and use the sync option to refresh the
license.
macOS BrowserSetup.zip
c. Run:
cd <path to BrowseSetup.exe file>
d. Run:
BrowseSetup.exe /CreateMsi
Note - You can install Harmony Browse extension on the Internet Explorer
using the .msi file only.
Note - If you do not install the extension, the prompt appears every time you open Safari.
If you do not want to install the extension and stop the prompt, in the terminal window,
run:
sudo defaults write
/Library/Preferences/com.checkpoint.harmony.browse.helper mute_
all_prompts -bool YES
7. Select the Harmony Browse checkbox and click Always Allow on Every Website.
8. Go to Security & Privacy and click Full Disk Access.
To verify whether the Harmony Browse client can access the Check Point services and the
stores of extensions, see sk179690.
2. Click Create.
The deployment process initiates.
You can monitor the deployment process in the portal and an email is sent on completion.
When creating a new user, you must assign a Global role to the user.
n Specific Service roles.
Assigning a Specific Service role to a new user is optional.
Global Roles
Role Description
Admin Allows Read & Write permissions across all services in your Infinity Portal
account.
When a new service is activated in your account, an Admin user
automatically gets Read & Write permissions in this service.
Read- Allows full Read-Only visibility to all services in your Infinity Portal account.
Only When a new service is activated in your account, a Read-Only user
automatically gets read permissions in this service.
User Allows management of all aspects of users and roles in your Infinity Portal
Admin account.
Only administrators with User Admin permission can access the Users tab
and associate roles with users.
Administrators with an Admin role and no User Admin role, cannot access
the Users tab.
Roles which apply only to a specific service, in this case the role selected here applies only
to the Harmony Browse service. You can assign only one Harmony Browse role per user.
The Specific Service role selected overrides the assigned Global roles. There are 6 types of
specific Harmony Browse roles:
Role Description
Read-Only User Has access to all system aspects, but cannot make any changes.
To see the list of users and the roles assigned to them, go to the Global Settings view >
Users.
Note - If the user you wish to add is not registered in Harmony Browse, they receive
a registration invitation to establish login credentials for the portal.
5. Click Add.
Note: - To edit or delete a user, select the user and click Edit or Delete from the top
toolbar.
At the upper-middle of your screen, near the name Harmony Browse, click the current
account and select the required account from the drop-down menu.
1. From the left navigation panel, click Global Settings (at the bottom of the panel).
2. In the top left section, click Users.
The list of currently defined users appears.
3. From the top toolbar, click New.
Note - If the administrator you wish to add is not registered in Harmony Browse,
they receive a registration invitation to establish login credentials for the portal.
5. Click Add.
Dashboard
The Dashboard page shows a graphical summary of important information about the Harmony
Browse clients in your organization.
Custom Dashboard
The Custom Dashboard allows you to create personalized dashboards with widgets of your
preference and specify whether the dashboard should be private or public. Private
dashboards are available only for you to view whereas, Public dashboards are available for all
the users with access to the Overview page. However, only the owner of the dashboard can
edit it.
Blank dashboard allows you to create a new dashboard with available widgets. Browse
template allows you to customize the Dashboard.
Note - The Add button is disabled if the widget is already added to the dashboard.
7. By default, all custom dashboards you create are set as Private. To make the custom
dashboard available to all users with access to the Overview page, from the Private list
on the upper-right corner, click Public. The system adds the dashboard under Public
dashboards for other users.
8. Click Save.
The dashboard appears under Custom Dashboard on the left navigation pane, and it is also
listed under My dashboards in the Custom Dashboard page.
2. To edit a dashboard:
a. Expand Custom Dashboard.
b. Click for the dashboard you want to edit and click Edit.
3. To delete a dashboard, expand Custom Dashboard, click for the dashboard you want
to delete and click Delete.
4. To hide a dashboard, expand Custom Dashboard, click for the dashboard you want to
hide and click Hide. The dashboard is removed from the list under Custom Dashboard
on the left navigation pane.
5. To unhide a dashboard, click , hover over the dashboard you want to unhide and click
Add. The dashboard is added to the list under Custom Dashboard on the left navigation
pane.
6. To duplicate a dashboard, click , hover over the dashboard and click Duplicate.
Reports
On the Reports page, you can download the reports in the pdf format:
Generate Report
To generate a report:
1. Go to Overview > Reports > Generate Report.
3. In the Time Frame list, select Last day, Last 7 days, or Last 30 days.
4. Click Export.
Scheduled Reports
Scheduled Reports allows you to automatically generate reports at the specified date and
time, and email it to the specified recipients.
Notes:
n The report becomes effective 24 hours after you schedule it. For example, if you
schedule for a new report today for 02:00 PM, then it is enforced from the next day at
02:00 PM.
n This feature is not supported for Check Point Cyber Security Reports.
n For performance reasons, it is recommended to schedule reports to run in off-peak
hours. For example, during non-business hours.
n The default time zone for the schedule report is Coordinated Universal Time (UTC).
For example, to schedule the report at 1:00 AM EST, specify the time as 6:00 AM
(depending on Daylight Savings Time).
To schedule a report:
1. Navigate to Overview> Reports and do one of these:
n From the Scheduled Reports page, click Add and from the Name list, select the
report.
n From the Generate Report page, select the report, click and select Schedule
Report.
8. To edit a scheduled report, select the report in the table and click Edit.
9. To delete a scheduled report, select the report in the table and click Delete.
Announcements
The Announcements page shows the latest news and enhancements in Harmony Browse.
Note - The General > Description at bottom pane shows the text entered in the
Active Directory for the asset. If no text is entered, it is blank.
n Filters
n Table Columns
5. Click OK.
6. To delete a Custom View:
a. From the View drop-down, go to Custom Views.
Status Icon
The icon in the Status column shows the client or computer status.
Status
Description
Icon
Indicates that a new computer was discovered that has no client installed.
Indicates that the computer was deleted from the Active Directory or from the
Organizational Tree.
Filters
Use the Filters pane on the top of the screen to filter the information in the table.
To add filters:
1. In the Filters pane, click +.
2. Select the required filter or search for the filter using the Search bar. For information on
the filters, see "Table Filters and Column Description" on the next page.
3. Click Update.
The system updates the table automatically for the added filters.
2. To select the columns for the table, search and select the columns.
3. To change the column position in the table, drag and drop the column to the required
position.
4. Click Update.
Tip - The URL in the address bar of the web browser captures the filters you specify for the
table. You can bookmark the URL to go to the Asset Management > Computers page and
view the table with the specified filters.
Table Filters and Column Description
Filter/Column
Description
Name
Status Status of the connected computer. For more information, see "Status
Icon" on the previous page.
Deploy Time Time when the client was installed on the computer.
Filter/Column
Description
Name
Browser Status Shows the browser and the Harmony Browse extension status on the
endpoint.
The supported statuses are:
n Not Installed -
o The browser is not installed.
o The browser is installed but not used.
o The browser is used but the extension is disabled by the
policy.
n
Running - The extension was detected. For example,
indicates that the Edge browser is active and the extension on it
was detected.
n Not Running - The browser is active but the browser extension
Managing Computers
Select the checkbox to the left of the applicable computers and right-click to perform these
actions:
General Actions
View Computer Logs
When the Endpoint client is installed on a computer, information about the computer is sent
to and stored on the Endpoint Security Management Server.
Resetting a computer means deleting all information about it from the server.
Resetting a computer does not remove the object from the Active Directory tree or change
its position in the tree.
Important - You can only reset a computer if the Endpoint client is not installed. If
you reset a computer that has Endpoint installed, important data is deleted and the
computer can have problems communicating with the Endpoint Security
Management Server.
Computer reset:
n Removes all licenses from the computer.
n Deletes Full Disk Encryption Recovery data.
n Deletes the settings of users that can log on to it.
n Removes the computer from Endpoint Security Monitoring.
n Deletes the Pre-boot settings.
n Marks the computer as unregistered.
After you reset a computer, you must reformat it before it can connect again to the Endpoint
Security service.
Delete
Removes the asset from the Local or Active Directory and adds it to Deleted Entities in the
Organizational Tree. This operation discards the assets license information. You can use
this operation when you remove an asset from your domain.
Note - If the Endpoint Security client is still installed on the asset, the client continues to
receive the updates from the Endpoint Security Management Server.
To add the asset back to the Active Directory, see Recover.
Recover
Adds the deleted asset back to the Local or Active Directory from Deleted Entities in the
Organizational Tree. The asset's status is not Active until its Endpoint Security client
connects and synchronizes with the Endpoint Security Management Server. You can use
this operation when you add an asset back to the domain.
Note - You can recover only a deleted asset.
Terminate
Warning - Removes the asset from the Harmony Endpoint management permanently. You
cannot recover a terminated asset. We recommend to terminate an asset only if it is
discarded or disposed or the Endpoint Security client is uninstalled.
Directory Scanner
Harmony Endpoint can scan and import users, groups, Organizational units (OUs) and
computers from multiple supported directory domains. See Managing Active Directory
Scanners.
3. Using corporate password in a non-corporate domain - End users are warned that use of
corporate password in a non-corporate domain is prohibited, and that his/her corporate
password was just exposed.
4. Accessing a local HTML file without the permission by the browser extension.
The blocking pages above are customizable. The following can be changed per each of them:
1. Company logo (replacing the Check Point logo).
2. Blocking page title.
3. Blocking page description.
The user may preview the change before saving the policy by pressing the preview button.
Note - The preview only works in the Chrome or Edge browsers, when the browser
extension is installed.
Rule The sequence of the rules is important because the first rule that matches
Number traffic according to the protected scope is applied.
Web & Files The configurations that applies to URL Filtering, Download Protection,
Protection Credential Protection, Safe Search and Advanced Settings.
Search
Policy Mode
Policy mode allows you to:
n Quickly configure a Threat Prevention policy by selecting a predefined policy mode
(Detect only, Tuning and Optimized). Check Point automatically sets the appropriate
operation mode (Detect, Prevent, Off) and Advanced Settings options for each
capability.
n Manually set the operation mode (Detect, Prevent, Off) and Advanced Settings options
for each capability (Custom).
Notes:
n The Detect only mode provides the basic protection. We recommend that you
use the Detect only policy mode for the first few days to gather, monitor and
analyze the data. Based on the analysis, you must switch to Tuning, Optimized
or configure a Custom policy mode for enhanced protection. If you use the
Detect only policy mode for the Default settings for the entire organization
rule (default) for more than two days, the system shows a banner as a reminder
to configure a stricter policy mode.
If you click Dismiss, the system stops the notification only for you while it
continues to appears for other users.
Policy Mode
Capability
Tuning Detect only Optimized
Advanced Settings
Policy Mode
Capability
Tuning Detect only Optimized
URL Filtering Allow user to dismiss the Allow user to dismiss the
URL Filtering alert and URL Filtering alert and
access the website is access the website is
disabled. selected.
Under Categories, Service is Under Categories, Service is
selected. selected.
Under Malicious Script Under Malicious Script
Protection: Protection:
o Block websites where o Block websites where
n Select Custom and set the operation mode manually. For more information, see
"Web and Files Protection" on page 57.
4. Click Save.
5. Click Save & Install.
n Click Align to accept the updates. The system automatically updates to the new settings
for the predefined mode.
n Click Keep to retain the current settings. The policy mode changes to Custom.
Files Protection
Download Emulation and Extraction
n Detect - Emulates original file without suspending access to the file and logs the
incident. The file is blocked if it is malicious or blocked by file extension (Advanced
Settings > Download Protection). If not, the file is downloaded before the
emulation is complete.
n Off - Downloads the file without protection.
4. For Advanced Settings, see "Download Protection" on page 66.
Upload Emulation
Upload Emulation uses Threat Emulation to analyze the files you upload to protected domains
to identify threats and mitigate them.
Notes:
n This feature is not supported for Harmony Browse clients managed through the
Harmony Endpoint Administrator Portal.
n The domains may support multiple ways to upload a file. For example, clicking a
button to browse and upload the file or drag-and-drop the file. If you upload files
by drag-and-drop, the Upload Emulation feature operates in the Detect mode,
even if you set to Prevent mode.
Credential Protection
Zero Phishing
Phishing prevention checks different characteristics of a website to make sure that a site does
not pretend to be a different site and use personal information maliciously.
5. In the Value field, enter the domain name or IP address of the protected domain. For
example, my-domain or 1.1.1.1
6. Select the required action for Password Reuse:
o Protected - Blocks users from reusing the password of protected domain in other
domains.
o Not Protected - Allows users to reuse the password of the protected domain in
other domains.
7. Click Save.
8. To delete the domain, select the domain and click Delete.
n To export only the domains with Password Reuse set as Protected, click Enable
Password Reuse.
n To export all domains, click Export All.
The system exports the data to a CSV file.
11. For Advanced Settings, see "Credential Protection" on page 74.
Safe Search
Search Reputation
Search Reputation is a feature added to search engines that classifies search results based on
URL's reputation.
Notes:
n It is supported only with Google, Bing, and Yahoo search engines.
n To enable this feature, ensure that you set URL Filtering Mode to either
Prevent or Detect.
4. In the Web & Files Protection tab, scroll-down to Search Reputation section and select
a mode:
n On - Turns on the feature.
n Off -Turns off the feature.
When you enable this feature, the icon across the URL in the search results indicate the
classification:
Icon Classification
Icon Classification
Note - If the Search Reputation cannot classify a URL, then it does not display an icon
across the URL. If you want such URLs to be classified and blocked, then enable the
Uncategorized checkbox in URL Filtering > Categories > General Use. The Search
Reputation classifies Uncategorized URLs as The website is blocked by the
Administrator.
Force Safe Search is a feature in search engines that acts as an automated filter for potentially
offensive and inappropriate content.
3. In the Web & Files Protection tab, under Force Safe Search, select a mode:
n On - Hides explicit content from the search results.
n Off - User sees the most relevant results for their search, which may include
explicit content like images consisting of violence.
Main features:
n When ‘Force Safe Search’ is on, Harmony Browse turns on Safe Search on the
supported search engines.
n It is supported with Google, Bing, and Yahoo search engines.
n Force Safe Search is off by default.
n Force Safe Search is supported with Google Chrome, and Microsoft Edge browsers.
Advanced Settings
URL Filtering
Note - You must set the URL Filtering Mode to Prevent or Detect to set the
Advanced Settings.
Allow user to dismiss the URL Filtering alert and access the website – Allows user to bypass
URL filtering and access the website.
Categories
Harmony Browse categorizes websites and you can specify the categories that must be
blocked for the user. When you select a category, the URL Filtering rule applies to all sites in
the selected category.
Black List
You can specify specific URLs, domains or IP addresses you want to block.
To black list a domain or IP address, click Show and add the URL, domain or IP address.
Notes:
n You can add the domain names manually or upload a CSV file with the domain
names you want to include in the blacklist.
n You can use * and ? as wildcards for blacklisting.
l * is supported with any string. For example: A* can be ADomain or AB or
AAAA.
l ? is supported with another character. For example, A? can be AA or AB or
Ab.
n You can export your blacklist.
n If you wish to completely block the domain www.test-domain.com, including its
sub-domains (sub1.test-domain.com, sub2.test-domain.com, etc’) and it is a
naked domain (test-domain.com, without the www), you need to add two values
to the block list:
l *.test_domain.com
l test_domain.com
n Anonymizer
n Botnets
n Critical Risk
n High Risk
n Medium Risk
n Phishing
n Spam
n Spyware
n Malicious Sites
n Suspicious Content
Note - Ensure that you set URL Filtering Mode to either Prevent or Detect.If it is set
to Prevent, the page is blocked and the event is logged. If it is set to Detect, the page
is not blocked and the event is logged.
Files Protection
General Settings
Emulation Environments
You can specify the size limit for files that must be sent for Threat Emulation. Files larger than
the specified limit are not sent to Threat Emulation.
Upload and emulate files under – Specify the file size limit for Threat Emulation. The default
file size limit is 15 MB. The maximum file size limit supported is 100 MB.
Note - Increasing the file size increases the client processing and network
traffic required to process large files.
Harmony Browse allows you to override the default file action for the supported and
unsupported files.
Download Protection
Note - You must set the Download Emulation & Extraction to Prevent or Detect to
set the Advanced Settings.
Harmony Browse protects against malicious files that you download to your Endpoint. By
default, it sends the files for extraction and emulation to Check Point's Threat Emulation on the
cloud before they are downloaded to the Endpoint disk. You can also configure Harmony
Browse with Threat Emulation on-premise. For more information, see sk113599.
n Threat Emulation: Detects zero-day and unknown attacks. Files are sent to sandbox for
emulation to detect evasive zero-day attacks.
n Threat Extraction: Proactively protects users from malicious content. It quickly delivers
safe files while the original files are inspected for potential threats.
Supported Files
7z lnk slk
arj O tbz2
gz rtf xla
hwp sh xlam
sldx xlw
img sldm xz
iqy zip
jar
one
Note - Ignore the files types listed in the Harmony Browse Administrator Portal.
The options available for supported file types of Threat Extraction are:
Unsupported Files
Custom Settings
n Block downloads when emulation fails due to size limit or connectivity problem -
Select the checkbox to block download of a file if the Threat Emulation of the file fails due
to technical reasons, such as file size limit, no internet connectivity and invalid licenses.
n Block downloads when emulation fails due to file encryption - Select the checkbox to
block download of a file, if the Threat Emulation of the file fails to extract the file due to
the file encryption.
Upload Protection
Harmony Browse protects against malicious files that you upload to the protected domains. By
default, it sends the files to Check Point's Threat Emulation on the cloud before they are
uploaded to the domains. You can specify the advanced settings for uploading files that are
supported and unsupported by Threat Emulation.
Note - This feature is not supported for Harmony Browse clients managed through
the Harmony Endpoint Administrator Portal.
o Allow – Allows the upload of file types that are not supported by Threat Emulation to
the protected domain.
Note - File type policy overrides the default file action selected here. For more
information, see "Override Default File Actions" on page 65.
Allows you to specify domains to which you want to either allow or block upload files,
regardless of the Upload Emulation setting.
3. Click
4. In the Value field, enter the domain name or IP address. For example, my-domain.com
or 1.1.1.1.
5. From the Action list, select the required action:
n Block
n Allow
6. Click OK.
9. Click OK.
Credential Protection
Note - You must set the Zero Phishing and Password Reuse to Prevent or Detect to
set the Advanced Settings.
Notes:
l You can customize the prompt page. For more information, see "Configuring
extensions.
1. When a user opens a local HTML file, the Harmony Browse request access to file
URLs prompt appears. Click Click to copy.
2. Paste the copied path in the address bar of the Chrome browser and press Enter.
3. Scroll down and turn on Allow access to file URLs.
4. If the HTML file has an input field, Harmony Browse scans the file and blocks it, if
identified as phishing.
n Disable notifications - Allows you to disable the browser zero-phishing scan notification
that appears when users try to enter in an input field.
Note - Only the notification is disabled but the browser zero-phishing scan is
performed in the background indicated by the yellow highlight around the input
field.
User can select any of these settings under Password Reuse Protection:
n To protect a domain, click Edit and enter the domain name or IP address.
n You can also select Allow users to dismiss the password reuse alert and access the
website setting.
Browser Settings
Pin Extension
This feature enables the administrator to configure to allow users to pin or unpin the browser
extension to the toolbar.
By default, Harmony Browse extension is pinned to the browser for all users with the Harmony
Browse Client version BROWSE_90.09.0001 and higher (Windows) and latest mac clients.
Note - You can unpin the extension only on Chromium browsers, such as Chrome,
Edge and Brave. You cannot unpin an extension in Firefox.
Windows
To allow users to unpin the browser extension, clear Always pin the browser extension to the
tool bar under Pin Extension.
The user must re-login by locking and unlocking the endpoint and either restart the browser or
wait for 15 minutes for the changes to reflect. This is not applicable to endpoints with the
Harmony Endpoint Security client installed as the browser extension is pinned automatically
through the policy update.
macOS
Note - Only the notification is disabled but the browser zero-phishing scan is
performed in the background indicated by the yellow highlight around the input
field.
n Disable Download Emulation & Extraction notifications - Select the checkbox to
disable the download emulation and extraction notifications whenever a file is
downloaded.
Incognito Mode
This feature allows administrators to control the availability of incognito mode for users. The
default option is Off.
Note - This feature is supported only for Endpoint Security client versions E88.60 and
higher.
n Off - The feature does not control the availability of incognito mode.
Note - Users can access incognito mode depending on the organization policies.
n Enable - Forces incognito mode to be available for users, overriding any existing
settings that might restrict its availability.
n Disable - Prevents users from accessing incognito mode by disabling it completely.
Legacy Exclusions
You can exclude specific objects from inspection by the protections:
Note - Global Exclusions is read-only. To add Global Exclusions, see "Adding Global
Exclusions" below.
5. Expand Rule Exclusions.
6. Select the exclusions you want to add to the rule.
7. Click OK.
8. In the bottom right corner of the policy configuration pane, click Save.
9. From the top, click Install Policy.
1. Do one of these:
n Go to Policy > Threat Prevention > Policy Capabilities.
n Go to Policy > Threat Prevention > Global Exclusions.
The Edit Exclusions Center window appears.
2. Click .
e. To add the exclusion to all the rules, select the Add to all rules checkbox. This step
does not apply to Global Exclusions.
Note - If the current rule contains this exception, then the system adds a duplicate
exclusion.
4. Click OK.
5. In the bottom right corner of the policy configuration pane, click Save.
6. From the top, click Install Policy.
Editing an Exclusion
To edit an exclusion:
1. Do one of these:
n Go to Policy > Threat Prevention > Policy Capabilities.
n Go to Policy > Threat Prevention > Global Exclusions.
The Edit Exclusions Center window opens.
2. Expand an exclusion category. For example, Anti-Bot -> URL Filtering Exclusions.
3. If you are editing a local exclusion, expand Local Exclusions. This step does not apply to
Global Exclusions.
4. Select the exclusion you want to edit.
5. Click .
8. In the bottom right corner of the policy configuration pane, click Save.
9. From the top, click Install Policy.
Below is the list of supported exclusions.
URL Filtering Exclusions
You can exclude specific domains from a rule. Click + to add the required domain you want
to exclude from the rule.
Syntax
n * indicates a string or a character. For example, A* can be ADomain or AB or AAAA.
n ? indicates a character. For example, A? can be AA or AB or Ab.
For example:
domain.com n https://www.domain.com -
n http://www.domain.com
n https://domain.com
n http://domain.com
n https://sub.domain.com
n http://sub.domain.com
n Domains
n SHA1 hashes from Threat Emulation and Threat Extraction
Domain exclusions
n To exclude an IP, in the Element field, enter IP address followed by subnet mask in
the format <X.X.X.X>/ <subnet mask >. For example, to exclude a computer with IP
address 192.168.100.30, enter 192.168.100.30/24.
n Domain exclusions must be added without http, https or any other special characters
except asterisk (*).
Domain exclusions can be added with or without www.
n Sub-domain exclusions are supported.
domain.com n https://www.domain.com -
n http://www.domain.com
n https://domain.com
n http://domain.com
n https://sub.domain.com
n http://sub.domain.com
SHA1 exclusions -
Notes -
l This is supported with Endpoint Security Client version E88.00 or
higher.
l To view the hash of a macro, see the Description in the Forensic
Details section in the Card of the event. For more information see,
Adding Exclusions from Logs.
Smart Exclusions
Smart Exclusions allows you to add exclusions to one or more capabilities and types easily,
whereas the Legacy Exclusions allows you to add exclusion only for one capability at a time.
With Smart Exclusions, you can:
n Set exclusions to all capabilities and operating systems at once.
n Use standard syntax across all exclusion types.
n Use wider range of wildcard characters for nuanced and customized exclusion patterns.
n Easily enable or disable exclusions with a simple toggle button without the need to delete
exclusions temporarily.
2. Select the rule for which you want to create the exclusion.
3. In the Capabilities & Exclusions pane, click Exclusions Center.
4. Click Go to Smart Exclusions.
e. From the Operating system list, select the operating system to which you want
to apply the exclusion. For example, endpoints running Windows operating
system only. It is not available if you select All supported in the Apply to the
following capabilities section.
Notes:
n Capabilities not relevant to the selected group are not
available.
n For supported syntax and capabilities for exclusion types,
see sk181679.
If the Exclusion
Then
Type is
File hash a. From the File hash type list, select the hash type:
n MD5
n SHA1
n SHA2
n cdhash (for macOS only)
h. Click Save.
Notes:
l Capabilities not relevant to the selected group are not
available.
l Anti-Exploit capability supports only Process path and
Infection/Protection exclusions.
h. Click Next.
Note - For supported syntax and capabilities for exclusion types, see
sk181679.
If the Exclusion
Exclusion Type Then
Group is
the process:
i. Right-click on the
executable file.
ii. Go to Properties >
Details > Original
filename.
n Process original name is
case-sensitive.
If the Exclusion
Exclusion Type Then
Group is
i. Click Finish.
8. Click OK.
9. Click Save & Install.
e. From the Operating system list, select the operating system to which you want
to apply the exclusion. For example, endpoints running Windows operating
system only. It is not available if you select All supported in the Apply to the
following capabilities section.
Notes:
n Capabilities not relevant to the selected group are not
available.
n For supported syntax and capabilities for exclusion types,
see sk181679.
If the Exclusion
Then
Type is
File hash a. From the File hash type list, select the hash type:
n MD5
n SHA1
n SHA2
n cdhash (for macOS only)
h. Click Save.
Notes:
l Capabilities not relevant to the selected group are not
available.
l Anti-Exploit capability supports only Process path and
Infection/Protection exclusions.
h. Click Next.
Note - For supported syntax and capabilities for exclusion types, see
sk181679.
If the Exclusion
Exclusion Type Then
Group is
the process:
i. Right-click on the
executable file.
ii. Go to Properties >
Details > Original
filename.
n Process original name is
case-sensitive.
If the Exclusion
Exclusion Type Then
Group is
i. Click Finish.
Best Practice - Check Point recommends to follow these steps before migrating to Smart
Exclusions:
1. Go to Policy > Threat Prevention > Policy Capabilities
2. Pick a rule to test the migration and clone the rule.
3. Place the newly created rule at the top.
4. Under Applied To, select a test group.
5. Click Exclusion Center for the newly created rule and export the legacy exclusions
for backup purposes.
6. For the newly created rule, migrate to Smart Exclusions. See "To migrate legacy
exclusions to smart exclusions:" below.
7. Click Save and Install.
8. Go to Logs and filter the logs for the computer in the test group. Verify that there are
no false positives and all the detections are excluded correctly. If there are issues,
contact Check Point Support.
9. Perform the steps 1 through 8 for each rule at a time.
10. Repeat the process for Global Exclusions.
Managing Exclusions
To manage exclusions:
1. To manage smart exclusions for a rule:
a. Go to Policy > Threat Prevention > Policy Capabilities.
b. Select the rule.
c. In the Capabilities & Exclusions pane, click Exclusions Center.
2. To manage global smart exclusions, go to Policy > Threat Prevention > Global
Exclusions.
3. Click Go To Smart Exclusions.
4. To edit an exclusion:
n
Select the exclusion and click .
n Right-click the row and click Edit.
To a change Single-method exclusion to Multi-method exclusion, click Edit in
multi-value wizard at the bottom of the wizard.
Refer to "Adding Exclusions to a Specific Rule" on page 82 to edit the exclusion.
5. To delete exclusions:
n
Select the exclusions and click .
n
Click the row and at the end of the row, click .
n Select the exclusions, right-click and click Delete.
6. To duplicate exclusions:
n
Select the exclusion and click .
n
Click the row and at the end of the row, click .
n Select the exclusion, right-click and click Duplicate.
7. To enable or disable the exclusion, toggle the button in the Status column.
8. To edit Name, Capabilities and Comment:
Browser Settings
Disabling Incognito Mode, BrowserGuest Mode, and InPrivate Mode
Overview
The browser extension is not installed automatically if the Incognito, Guest or InPrivate mode
is enabled in your browser. We recommend that you disable these modes to secure your
users.
Chrome on Windows
3.
To disable Run
Firefox on Windows
Brave on Windows
To disable Incognito mode, Incognito mode with Tor and BrowserGuest mode:
1. Select Start and type CMD.
To disable Run
Chrome on macOS
Firefox on macOS
4. Press Enter.
4. Press Enter.
Managing IoCs
Indicator of Compromise (IoC) is an indicator to cyber security professionals about an unusual
activity or an attack. Harmony Browse allows you to add IoCs for domains, IP addresses,
URLs, MD5 Hash keys and SHA1 Hash keys that are automatically blocked by File Protection
(Threat Emulation and Threat Extraction) and URL Filtering without the need to install the
policy.
Prerequisite
n For the IoCs domain, IP address and URL, activate (Prevent or Detect) the URL Filtering
capability.
n For the IoCs MD5 Hash and SHA1 Hash, activate (Prevent or Detect) the Download
Protection capability.
To add IoCs:
1. Click Policy > Threat Prevention.
2. Click Manage IoCs.
3. Click .
3. Click .
Note - The system verifies the entries in the excel and discards invalid entries.
5. Click Import.
The IoCs are added to the table.
To edit an IoC:
1. Click Policy > Threat Prevention.
2. Click Manage IoCs.
3. Select the IoC.
4. Click .
To delete IoCs:
1. Click Policy > Threat Prevention.
2. Click Manage IoCs.
3. Select the IoCs.
4. Click .
A prompt appears.
5. Click OK.
3. Click .
DLP Logs
n Logs are sent for Block, Prevent, and Detect actions.
n File upload and File download events generate log for each handled file, regardless of
whether the event is blocked, prevented, detected, or allowed.
n Text control and Paste events send logs for blocked, prevented, or detected incidents.
Use Case
You are a financial organization aiming to prevent the upload or download of files containing
confidential and sensitive data, such as bank account numbers, tax and revenue details, by
unauthorized users.
Known Limitations
n This feature is supported in EU and US regions only.
n DLP is not applied if the file size is greater than 10 MB.
n DLP is not applied when you drag and drop a folder to upload files, and in such cases,
the upload of the folder gets blocked.
n If the downloaded file is scanned by DLP, it is not sent to Threat Emulation.
Legends Description
2 Date and time (in MM/DD/YY, HH:MM:SS XM format) when the data type
was last modified.
4 Custom tags (category) for the data type. Helps in searching for data types.
5 Matching criteria:
n Pattern
n Keyword
n Dictionary
n Weighted Words
n Template
n File attribute
n Compound (Combination of data types with a logical separator)
n Group (Data type group)
6 The minimum number of times the matching criteria must be present in the
file to trigger the DLP action specified in the policy capability rule. For
example, if the matching criteria is Keyword, the value is credit and the
Matching Threshold is 5, then the system takes the action specified by the
policy capability rule if the file contains the term credit five times or more.
Legends Description
12 Comment.
3. Enter the data type name, object comment (optional) and description.
4. From the Data type recognition method list, select a recognition method:
Note - The
recommended file
formats are Microsoft
Word and .txt.
Threshold=15. Maximum
allowed for
If the file contains six weight for the
occurrences of credit, each keyword.
contributing a Weight of 1. c. If the keyword is a
That is, 1x6=6. As the Max. regular expression,
Weight=3, the final weight is turn on the Regex
3. toggle button.
d. Click Add.
If the file contains eight e. Repeat steps a
occurrences of transaction, through d to add the
each contributing a Weight of next keyword.
2. That is, 2x8=16. As the
Max. Weight=30, the final
weight is 16.
File attribute Applies the action specified Select any of these and
in the policy capability rule if enter a value:
the file: n File name. For
n Matches the specified example, Account
file name. Numbers, Employee
n Size is equal to or Details.
greater than the n File size. File size in
5. Click Next.
Note - This step does not apply to Template and File attribute recognition
methods.
Note - This step does not apply to Template and File attribute recognition
methods.
7. Click Finish.
The new custom data type is listed under Custom Data Types.
8. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
9. Click Confirm.
10. To discard all the changes, click Discard at the top.
The change detected window appears.
4. To add predefined data types to the group, click in the Predefined Data types field
and select the data type.
5. To add custom data types to the group, click in the Custom Data types field and
select the data type.
6. Click Save.
The new data type group is listed under My Groups.
7. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
8. Click Confirm.
9. To discard all the changes, click Discard at the top.
The change detected window appears.
2. In the Data Type Name list, expand Custom Data Types or Predefined Data Types and
select the data type.
6. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
7. Click Confirm.
8. To discard all the changes, click Discard at the top.
The change detected window appears.
9. Click Confirm.
2. In the Data Type Name list, expand the DLP group and select the data type or the group.
3. Click Edit.
Note - In the Check Point Recommended and Predefined Data Types DLP
groups, you can edit only Matching level and Add object comment.
5. Click OK.
6. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
7. Click Confirm.
8. To discard all the changes, click Discard at the top.
The change detected window appears.
9. Click Confirm.
2. In the Data Type Name list, expand the DLP group and select the data type or the group
within.
3. Click Duplicate.
4. Make the required changes.
5. Click OK.
6. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
7. Click Confirm.
8. To discard all the changes, click Discard at the top.
The change detected window appears.
9. Click Confirm.
2. In the Data Type Name list, expand the DLP group and select the data type or the group
within.
3. Click Delete.
The Deleting a data type window appears.
5. To permanently save all the changes to the database, click Save at the top.
The change detected window appears.
6. Click Confirm.
7. To discard all the changes, click Discard at the top.
8. Click Confirm.
Step 1 - Copy the Microsoft Sensitivity label names and their UUIDs
from Microsoft Purview
1. Log in to Purview Portal: https://purview.microsoft.com/
2. Go to Solutions > Information protection > Labels.
3. Click the label name for which you want to find the UUID.
4. Copy the UUID in the Label ID or GUID section.
4. Click New.
5. In the Name field, enter a name for the label. For example, MIP_EXAMPLE.
6. In the UUID field, enter the label UUID. For more information, see "Step 1 - Copy the
Microsoft Sensitivity label names and their UUIDs from Microsoft Purview" on page 127.
7. Click Add.
8. Click OK.
Note - The newly created label is now listed in Sensitivity Labels under Data
Type Name section.
It also shows the label details:
n Date modified
n Description
n Tags - Shows tags assigned, if any, for further categorization
n Where used - Shows the DLP rule name that uses this label to enforce
protection.
n Groups - Shows if the label is part of any group.
You can use Tags and Groups to better organize and manage the sensitivity
labels.
9. To edit a label, select the label you want to edit, click Edit, update the field and then click
Apply.
10. To delete a label, select the label you want to delete, click Delete and then click Delete
Data Type.
a. Select a rule.
b. Click Clone and click Clone Above or Clone Below.
Note - If you have selected the default rule, select Clone Above.
Note - Enforcement of DLP for Paste and Text Control events is only
supported for Generative AI sites.
n Inbound events - Inbound data refers to downloading data and sharing content
within internal corporate resources.
Example - Downloading file from a file sharing website.
5. Click Add.
The Data Protection - New Event window appears.
6. By default, the event is enabled. To disable, turn off the Status toggle button.
7. From the Event type list, select one of these:
n File upload - To apply the DLP rule when you upload a file to an external resource.
n Text control - To apply the DLP rule when you type text in an external resource text
box. For example, in ChatGPT.
n Paste - To apply the DLP rule when you paste content into an external resource.
For example, ChapGPT.
n File download - To apply the DLP rule when you download a file from an internal
resource.
Note - Enforcement of DLP for Paste and Text Control events is only supported
for Generative AI sites.
8. From the Destination type list, select one of these type to which you want to apply the
rule:
Destination
Enter these
type
All N/A
Url In the URL field, enter the web addresses to which you want to apply
the rule.
Domain In the Domain field, enter the domain to which you want to apply the
rule.
Category From the Categories & sub categories list, select one or more
categories.
Notes:
n In Inbound events, you can only choose a URL or Domain.
n In Inbound events, if a source is added for DLP scanning, files
10. To associate data types with an event, in the Data types section, click and select the
data type or a group.
12. To delete an event, select the event that you want to delete and click Delete.
13. To edit an event, select the event that you want to edit, click Edit, make the required
changes and click OK.
14. To disable all events, turn off the Disable all toggle button.
Note - The Paste and Text control events, only have access to the Category level.
Scenarios
Specific Event
Result
Specific Event
Result
Specific Event
Result
Specific Event
Result
Specific Event
Result
Specific Event
Since there are no specific events for the URL, Domain, or Category, the event with the
destination All is selected.
Result
When multiple events are relevant for the same incident, the events with the strict action is
selected.
Specific Event
Result
Specific Event
Since there are no events for the URL, only two events for the Domain domain1.com are
relevant.
Result
General Information
Localization
The Harmony Browse extension automatically detects the language of the browser and
translates the following to the detected language:
n Pop-up and associated notifications
n Block pages
Note - The customized parts of a block page are not translated. For more
information, see "Configuring Client Settings Policy" on page 50.
n OS notifications
The supported languages for localization are:
n Czech
n Danish
n German
n Greek
n English
n Spanish (European and Latin American)
n Finnish
n French
n Italian
n Japanese
n Norwegian Bokmål
n Dutch
n Norwegian Nynorsk
n Norwegian
n Polish
n Portuguese (European and Brazilian Portuguese)
n Romanian
n Russian
n Swedish
Harmony Browse supports the use of multiple AD scanners per Active Directory domain, and
multiple domains per service.
An object deleted from the Active Directory is not immediately erased, but moved to the
Deleted Objects container.
Comparing objects in the AD with those in the Deleted objects container gives a clear picture
of network resources (computers, servers, users, groups) that have changed since the last
scan.
The Active Directory Scanner does not scan Groups of type "Distribution".
When you create a new AD scanner, the Organization Directory Scan is automatically
disabled.
To see information on your activated AD scanners, go to the Endpoint Settings view.
Note - You can also reach scanner configuration form through the Endpoint Settings
view > Setup full Active Directory sync.
Use the time filter (1) and select the relevant options on the Statistics pane (3) to set specific
criteria and customize the search results. Alternatively, you can enter your query in the search
bar. For more details about the Query Language, see "Query Language Overview" on
page 150.
Item Description
1 Time period - Search with predefined custom time periods or define another time
period for the search.
3 Statistics pane - Shows statistics of the events by Blades, Severity of the event
and other parameters.
5 Results pane - Shows log entries for the most recent query.
6 Options - Hide or show a client identity in the Card, and export the log details to
CSV.
Note - You can forward logs to expansion (SIEM). For more information, see Event
Forwarding.
Most query keywords and filter criteria are not case sensitive, but there are some exceptions.
For example, "source:<X>" is case sensitive ("Source:<X>" does not match).
If your query results do not show the expected results, change the case of your query criteria,
or try upper and lower case.
When you use queries with more than one criteria value, an AND is implied automatically, so
there is no need to add it. Enter OR or other boolean operators if needed.
Criteria Values
Criteria values are written as one or more text strings.
You can enter one text string, such as a word, IP address, or URL, without delimiters.
Phrases or text strings that contain more than one word must be surrounded by quotation
marks.
One-word string examples
n John
n inbound
n 192.168.2.1
n some.example.com
n dns_udp
Phrase examples
n "John Doe"
n "Log Out"
n "VPN-1 Embedded Connector"
IP Addresses
IPv4 and IPv6 addresses used in log queries are counted as one word.
Enter IPv4 address with dotted decimal notation and IPv6 addresses with colons.
Example:
n 192.0.2.1
n 2001:db8::f00:d
You can also use the wildcard '*' character and the standard network suffix to search for
logs that match IP addresses within a range.
Examples:
n src:192.168.0.0/16
n src:192.168.1.0/24
n src:192.168.2.*
NOT Values
You can use NOT <field> values with Field Keywords in log queries to find logs for which the
value of the field is not the value in the query.
Syntax:
Example:
NOT src:10.0.4.10
Wildcards
You can use the standard wildcard characters (* and ?) in queries to match variable
characters or strings in log records.
You can use more than the wildcard character.
Wildcard syntax:
n The ? (question mark) matches one character.
n The * (asterisk) matches a character string.
Examples:
n Jo? shows Joe and Jon, but not Joseph.
n Jo* shows Jon, Joseph, and John Paul.
If your criteria value contains more than one word, you can use the wildcard in each word.
For example, 'Jo* N*' shows Joe North, John Natt, Joshua Named, and so on.
Note - Using a single '*' creates a search for a non-empty value string. For example
asset name:*
Field Keywords
You can use predefined field names as keywords in filter criteria.
The query result only shows log records that match the criteria in the specified field.
If you do not use field names, the query result shows records that match the criteria in all fields.
This table shows the predefined field keywords. Some fields also support keyword aliases that
you can type as alternatives to the primary keyword.
Keyword
Keyword Description
Alias
<field name>:<values>
Where:
n <field name> - One of the predefined field names
n <values> - One or more filters
To search for rule number, use the Rule field name.
For example:
rule:7.1
If you use the rule number as a filter, rules in all the Layers with that number are matched.
To search for a rule name, you must not use the Rule field. Use free text.
For example:
Examples:
n source:192.168.2.1
n action:(Reject OR Block)
You can use the OR Boolean operator in parentheses to include multiple criteria values.
Important - When you use fields with multiple values, you must:
n Write the Boolean operator, for example AND.
n Use parentheses.
Boolean Operators
You can use the Boolean operators AND , OR, and NOT to create filters with many different
criteria.
You can put multiple Boolean expressions in parentheses.
If you enter more than one criteria without a Boolean operator, the AND operator is implied.
When you use multiple criteria without parentheses, the OR operator is applied before the
AND operator.
Examples:
Shows log records from the Application and URL Filtering Software Blade where traffic
was blocked.
n 192.168.2.133 10.19.136.101
Shows log entries that match the two IP addresses. The AND operator is presumed.
n 192.168.2.133 OR 10.19.136.101
Shows all log entries from the Firewall, IPS or VPN blades that are not dropped.
The criteria in the parentheses are applied before the AND NOT criterion.
n source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
Shows log entries from the two source IP addresses if the destination IP address is
17.168.8.2.
This example also shows how you can use Boolean operators with field criteria.
Notes:
n A user or a device can belong to multiple virtual groups.
n Selecting a certain user or device shows the Active Directory information
or select users or devices first and then create a group from them.
8. Click OK.
Note - You can also perform this procedure from Asset Management >
Organization > Computers. See "Managing Computers" on page 46.
Note - You can also perform this procedure from Asset Management >
Organization > Computers. See "Managing Computers" on page 46.
4. To create and add a specific device or a user to a virtual group, click the group and right-
click the device or user.
5. Select Create and Add to Virtual Group.
The Add Members to Virtual Group window appears.
9. Click OK.
Note - You can also perform this procedure from Asset Management >
Organization > Computers. See "Managing Computers" on page 46.
Exporting Logs
Check Point Log Exporter is an easy and secure method to export Check Point logs over
syslog. Log Exporter is a multi-threaded daemon service which runs on a log server. Each log
that is written on the log server is read by the Log Exporter daemon. It is then transformed into
the applicable format and mapping and sent to the end target.
For more information, see sk122323.
2. Click Add.
The New Logging Service window opens.
3. Fill in the export details:
n Name - Enter a name for the exported information.
n IP Address - Enter the IP Address of the target to which the logs are exported.
n Protocol - Select the protocol over which to export the logs: TCP or UDP.
n Format - Select the export format.
n Port - Select the port over which to export the logs. Only these ports are supported
for outgoing communication: 514, 6514, 443.
n TLS/SSL - Select this checkbox if you want log information to be TLS/SSL
encrypted. The only allowed authentication method through TLS is mutual
authentication. For mutual authentication, the log exporter needs these certificates:
l A *.pem Certificate Authority certificate (must contain only the certificate of
the CA that signed the client/server certificates, not the parent CA).
l A *.p12 format client certificate (log exporter side).
For instructions on how to create the certificates, see "Creating Security
Certificates for TLS Mutual Authentication" below.
4. Click Add.
Notes:
n Make sure to run the openssl commands on a 3rd party CA server (not on the
log exporter device). The log exporter device must have a connectivity to the CA
server.
n The commands are not supported on a Check Point Security Management
Server or a Multi-Domain Server.
Procedure
1. Create a CA certificate
Step Description
Step Description
Step Description
Step Description
Step Description
Reports Center
The Reports Center provides you with the insights of the security analysis detected by the
endpoint. These reports can be generated and scheduled.
Generate Report
To view predefined reports, navigate to Endpoint Settings > Reports Center > Generate
Report.
You can download these reports in the pdf format:
n Security Checkup - A comprehensive report on security events.
n Threat Extraction - Shows the insights on the downloaded files.
n Check Point Cyber Security Report 2023 - Shows the insights to help your organization
stay secure.
To download a report:
1. Select the report and click Export Report.
The Export Report window appears.
2. In the Time Frame list, select Last day, Last 7 days, or Last 30 days.
3. Click Export.
Schedule Report
Schedule Report allows you to automatically generate reports at the specified date and time,
and email it to the specified recipients.
Notes:
n The report becomes effective 24 hours after you schedule it. For example, if you
schedule for a new report today for 02:00 PM, then it is enforced from the next day at
02:00 PM.
n This feature is not supported for Check Point Cyber Security Reports.
n For performance reasons, it is recommended to schedule reports to run in off-peak
hours. For example, during non-business hours.
n The default time zone for the schedule report is Coordinated Universal Time (UTC).
For example, to schedule the report at 1:00 AM EST, specify the time as 6:00 AM
(depending on Daylight Savings Time).
To schedule a report:
1. Navigate to Endpoint Settings > Reports Center > Schedule Report.
2. Click Add.
The Schedule Report window appears.
3. From the Name list, select the report.
4. From the Time Frame list, select the period for the report:
n Last day
n Last 7 days
n Last 30 days
5. From the Frequency list, select the frequency to generate the report:
n To generate the report everyday, select the day of the week.
n To generate the report weekly, select the day of the week.
n To generate the report every month, select the date.
6. In the Time field, specify the time for the system to generate the report and send it to the
recipients. By default, the time is in UTC. For example, if you want to generate the report
at 01.00 AM Eastern Standard Time (EST), you must specify the time as 06.00 AM UTC.
7. In the Recipients field, enter the recipients for the report.
8. Click Schedule.
The schedule is added to the table. The report becomes effective 24 hours after you
schedule it.
9. To edit a scheduled report, select the report in the table and click Edit.
10. To delete a scheduled report, select the report in the table and click Delete.