Sign In
Upload
Manuals
Brands
Check Point Manuals
Network Hardware
HARMONY R81
Check Point HARMONY R81 Manuals
Manuals and User Guides for Check Point HARMONY R81. We have
1
Check Point HARMONY R81 manual available for free PDF download: Administration Manual
Check Point HARMONY R81 Administration Manual (451 pages)
ENDPOINT SERVER
Brand:
Check Point
| Category:
Network Hardware
| Size: 4 MB
Table of Contents
Table of Contents
5
Introduction to Endpoint Security
19
Managing the Security of Users, Not Just Machines
19
Organization-Centric Model
19
Policy-Centric Model
19
Endpoint Security Client
19
Centralized Monitoring
21
Centralized Deployment
22
Endpoint Security Architecture
23
Endpoint Security Server and Client Communication
26
Smartendpoint Console and Server to Server Communication
26
Client to Server Communication
27
The Heartbeat Interval
28
SHA-256 Certificate Support
28
Tlsv1.2 Support
28
External PKI Certificates for Client-Server Communication
30
Importing External PKI Certificates
30
Installing CA Certificates on Clients
31
Installing SSL Certificates on Servers
32
Replacing SSL Certificates in an Existing Environment
33
Installing Full Disk Encryption Certificates
33
Installing Certificates for Offline Groups
34
Monitoring Certificates
34
Connection Port to Services on an Endpoint Security Management Server
35
Background
36
Procedures
39
Endpoint Security Licenses
49
Endpoint Security Product Licenses
49
Demo and Temporary Licenses
49
License Enforcement
49
Getting Licenses
50
Getting and Applying Contracts
51
Configuring a Proxy for Internet Access
52
License Status
52
Logging into Smartendpoint
54
Using Smartendpoint
55
Overview Tab
55
Opening Smartendpoint
56
Policy Tab
56
Users and Computers Tab
57
Monitoring Endpoint Security Deployment and Policy
58
Alerts
59
Configuring Alert Messages
59
Configuring an Email Server
60
Push Operations
62
Starting Push Operations
63
Push Operations Settings
64
Compliance Status Reports
65
Activity Reports
66
Software Deployment Status Reports
67
Versions in Use
67
Full Disk Encryption Status Reports
68
User Authentication (Onecheck) Status Reports
69
Media Encryption & Port Protection Status Reports
71
Discovered Devices
71
Anti-Malware Status Reports
72
Harmony Endpoint Anti-Bot Status Reports
73
Policy Reports
74
Licenses Report
76
Deployment Tab
77
Client Logging
78
Finding Components
79
Show/Hide Components
80
Users and Computers
81
Using the Users and Computers Tab
82
Using the Object Details Window
83
Changing Authentication Settings
83
Using the Users and Computers Tree
84
Managing Users
86
Managing Ous or Groups
87
Managing Computers
88
Managing Users of a Computer
88
Resetting a Computer
89
Editing Properties of Non-AD Objects
91
Managing Virtual Groups
92
Active Directory Scanner
93
Configuring a Directory Scanner Instance
93
The Organization Scanners Page
95
Directory Synchronization
95
Troubleshooting the Directory Scanner
96
SSL Troubleshooting
96
Configuring DNS for GSS Connections
97
Strengthening Active Directory Authentication to Use LDAPS
97
Endpoint Security Administrator Roles
101
Deploying Endpoint Security Clients
102
Uploading Client Packages to the Repository
103
Automatic Deployment Using Deployment Rules
108
Manual Deployment Using Packages for Export
114
Configuring Software Signatures for Packages for Export
118
Seeing the Deployment Status
119
Deploying Mac Clients
120
Getting the Mac Client
120
Manual Deployment
120
Uninstalling the Client on Mac
121
Upgrading Endpoint Security Clients
122
Upgrading with Deployment Rules
122
Upgrading with an Exported Package
123
Gradual Upgrade
124
Upgrading Legacy Clients
125
Offline Upgrades
125
Online Upgrades
126
Upgrading Legacy Full Disk Encryption
127
Troubleshooting the Installation
130
Uninstalling the Client on Windows
131
Configuring Logging
132
Backup and Restore
133
Prerequisites
133
How to Back up and Restore
133
Updating the PAT Version on the Server after Restore
134
Defining Endpoint Security Policies
135
Columns of a Policy Rule Base
136
The Policy Toolbar
137
User and Computer Rules
138
Connected, Disconnected and Restricted Rules
139
Rule Types for each Endpoint Security Component
140
Rule Entities
141
Protection for Servers
142
Working with Rules
143
Creating a Rule
143
The Order in Which the Client Applies the Rules
144
Changing the Order in Which the Client Applies the Rules
145
Editing a Rule
147
Editing a Shared Action
148
What Happens When You Delete an Entity
149
Saving and Installing Policy Changes on Clients
149
Showing the Policy that Applies to a User or Computer
150
Direct Assignment of Rules to Users and Computers
150
Virtual Groups in Policy Rules
152
Why Use Virtual Groups
152
Prerequisites for Using Virtual Groups
153
Types of Virtual Groups
153
Predefined Virtual Groups
153
Managing Virtual Groups
154
Using a Computer Group in a User-Based Policy
155
Example Deployment Rules for Virtual Groups
156
Adding Objects with an Installation Package
157
Monitoring Virtual Groups
158
External Endpoint Policy Servers
159
Installing and Configuring an Endpoint Policy Server
159
Installing an Endpoint Policy Server
159
Configuring an Endpoint Policy Server
159
How Do Endpoint Policy Servers Work
161
Configuring Policy Server Settings
163
Endpoint Policy Server Proximity Analysis
163
Configuring Endpoint Policy Server Connections
164
Enabling the Management Server to be an Endpoint Policy Server
164
Policy Server and Management Server Communication
165
Configuring an Alert for a Non-Synchronized Policy Server
167
Monitoring Endpoint Policy Server Activity
169
Management High Availability
170
Configuring a Secondary Server
170
Synchronizing MSI Files, Dynamic Packages and Drivers
172
Online Automatic Sync
173
Before Failover
173
Database Migration in a High Availability Environment
174
Updating the PAT Version on the Server
174
Deleting a Server
175
Active Directory Authentication
176
Endpoint Security Active Directory Authentication
176
Configuring Active Directory Authentication
177
UPN Suffixes and Domain Names
180
Configuring Alternative Domain Names
181
Troubleshooting Authentication in Server Logs
181
Troubleshooting Authentication in Client Logs
183
Full Disk Encryption
185
Check Point Full Disk Encryption
185
Configuring a Check Point Full Disk Encryption Policy
186
Volume Encryption
188
Custom Disk Encryption Settings
189
Self-Encrypting Drives
189
Authentication before the Operating System Loads (Pre-Boot)
191
Temporary Pre-Boot Bypass
192
Temporary Pre-Boot Bypass with a Script
194
Temporarily Require Pre-Boot
194
Advanced Pre-Boot Settings
195
User Authorization before Encryption
197
Single Sign-On with Onecheck Logon
199
Check Point Full Disk Encryption Recovery
201
Creating Data Recovery Media
201
Using Data Recovery Media
203
Before You Use the Drive Slaving Utility
203
Using the Drive Slaving Utility
204
Check Point Full Disk Encryption Self-Help Portal
205
Activating the Self-Help Portal
205
Configuring the Self-Help Portal
206
User Settings for the Self-Help Portal
206
Monitoring the Self-Help Portal Policy
207
Bitlocker Encryption for Windows Clients
208
Configuring a Bitlocker Encryption Policy
209
Switching between Check Point Full Disk Encryption and Bitlocker Management
212
Taking Control of Unmanaged Bitlocker Computers
214
Bitlocker Recovery
215
Installing and Deploying Full Disk Encryption
217
Client Requirements for Full Disk Encryption Deployment
217
Completing Full Disk Encryption Deployment on a Client
218
Stages of the Deployment Phase
218
Upgrading Full Disk Encryption
220
Troubleshooting Full Disk Encryption
221
User Authentication to Endpoint Security Clients (Onecheck)
227
Configuring Onecheck User Settings Policy Rules
228
Pre-Boot Authentication Methods
228
Global Pre-Boot Authentication Settings
228
Changing the User Pre-Boot Authentication Settings
230
Password Complexity and Security
232
Password Synchronization
233
Account Lock
234
Logon Settings
236
Remote Help Permissions
237
Managing Authorized Pre-Boot Users and Nodes
238
Creating Pre-Boot Users
239
AD Groups for Pre-Boot Authentication
240
Before You Configure Smart Card Authentication
241
Smart Card Scenarios
241
Scenario 1: Moving from Password to Smart Card
241
Scenario 2: MIX of Password and Smart Card Authentication
242
Notes on Using Smart Cards
243
Changing a User's Password
244
Managing Dynamic Tokens
245
Adding a Token
245
Removing a Token
246
Importing Tokens
246
Upgrading Legacy Token Users
246
Media Encryption & Port Protection
248
Media Encryption & Port Protection Terminology
249
Working with Actions in a Media Encryption & Port Protection Rule
250
Configuring the Read Action
251
Configuring a Write Action
252
Configuring Business Related File Types
254
Creating a Custom User Message
255
Configuring Peripheral Device Access
256
Creating a Custom Action
256
Changing an Existing Action
256
Defining Exceptions for Devices
258
Editing Device Details
258
Creating a Device with Automatic Device Discovery
259
Creating a Device Manually
260
Editing Device Access Setting
260
Using Wild Card Characters
261
Working with Advanced Actions in a Media Encryption & Port Protection Rule
263
Offline Access Actions
263
Custom Offline Access Settings
263
Configuring Encryption Container Settings
265
Password Constraints for Offline Access
265
Media Lockout Settings
266
Device Scanning and Authorization Actions
268
Custom Scan and Authorization Actions
269
Log Actions
271
Usercheck Actions
273
Media Encryption Site Actions
274
Configuring Media Encryption Site Actions
274
Global Automatic Access Action
277
Custom Automatic Access Action Rules
277
Capsule Docs
279
Overview of Capsule Docs
279
Prerequisites for Capsule Docs
280
Configuring Capsule Docs
281
Using Capsule Docs
288
Configuring Capsule Docs Policy Rules
289
Organization Settings
289
Active Classifications
289
Email Domains for Sharing Documents
291
Automatic Protection
291
Initial Protection Configuration
292
Inviting Users
292
Client Access Settings
293
Single Sign-On with Active Directory
293
Working with External Users
293
Troubleshooting Capsule Docs Reverse Proxy
294
Capsule Docs Recovery
296
Anti-Malware
297
Prerequisites for Anti-Malware
297
Configuring Anti-Malware Policy Rules
299
Scan All Files on Access
299
Malware Signature Updates
301
Performing Periodic Anti-Malware Scans
303
Periodic Scan Options
304
Exclude Files and Folders from Scan
304
Scan Optimization
306
Malware Treatment
307
Submitting Malware and False Detections
309
Harmony Endpoint Anti-Ransomware, Behavioral Guard and Forensics
310
Anti-Ransomware Files
311
Configuring Forensics and Anti-Ransomware Policy Rules
312
Automatic Threat Analysis Settings
312
Configuring Network Blades for Forensics Triggers and Remediation
313
Monitoring and Exclusions
314
Disk Space for Forensics
315
Quarantine Settings and Attack Remediation
316
File Quarantine Settings
317
Anti-Ransomware Backup Settings
318
Manual Anti-Ransomware Restoration
319
Anti-Ransomware Restoration
319
Integration with Third Party Anti-Virus Vendors
321
Manual Analysis with CLI
322
Manual Analysis with Push Operations
324
Forensics
325
Opening Forensics Analysis Reports
326
Harmony Endpoint Dynamic Updates
327
Harmony Endpoint Use Case
328
Ransomware Use Case
329
Quarantine Management
330
Using the Quarantine Manager for Administrators
330
Harmony Endpoint Anti-Bot
332
The Need for Anti-Bot
332
The Harmony Endpoint Anti-Bot Solution
333
Configuring Anti-Bot Policy Rules
334
Activating the Anti-Bot Component
334
Defining Entities that Are Trusted by Anti-Bot
335
Anti-Bot Protection Mode
336
Harmony Endpoint Threat Extraction, Emulation and Anti-Exploit
337
Configuring Threat Extraction and Threat Emulation Rules
338
Web Download Protection
339
File System Emulation
341
Harmony Environment Settings
342
Exclusions and Inspection Settings
343
Zero Phishing Settings
344
Firewall
346
Planning Firewall Policy
346
Inbound Traffic Rules
347
Outbound Traffic Rules
348
Creating Firewall Rules
349
Services and Network Objects
350
Disabling and Deleting Rules
351
Wireless Connection Settings
352
Hotspot Settings
353
Ipv6 Traffic
354
Choosing a Firewall Policy to Enforce
355
Compliance
356
Planning for Compliance Rules
357
Configuring Compliance Policy Rules
358
Ensuring Alignment with the Deployed Profile
358
VPN Client Verification
359
Compliance Action Rules
360
Compliance Check Objects
361
Compliance Remediation Objects
363
Service Packs for Compliance
365
Required Applications and Files
366
Prohibited Applications and Files
367
Anti-Malware for Compliance
368
Ensuring that Windows Server Updates Are Installed
369
Monitoring Compliance States
370
The Heartbeat Interval
370
Configuring the "About to be Restricted" State
371
Application Control
372
Creating the List of Applications on the Reference Computer
373
Appscan Command Syntax
373
Importing the Appscan XML File to the Endpoint Security Management Server
376
Configuring if Imported Applications Are Allowed or Blocked by Default
377
Configuring Application Permissions in the Application Control Policy
378
Using the Reputation Service to Allow or Block Applications
381
Pre-Requisites for Using the Reputation Service
381
Using the Reputation Service with a Proxy
382
Enabling the Reputation Service
382
Disabling or Enabling Windows Subsystem for Linux (WSL)
383
Preventing the Leakage of Sensitive Information through Git (Developer Protection)
384
Client-Side Warning Notifications
385
Installing the Application Control Policy
386
Client Settings
387
Configuring Client Settings Policy Rules
387
Client User Interface Settings
388
Log Upload
389
Installation and Upgrade Settings
390
Users Disabling Network Protection
391
Sharing Data with Check Point
392
Remote Access VPN
393
Access Zones
394
Trusted Zone
395
Changing the Access Zones Policy
397
Network Objects
399
Configuring a Host as a Network Object
399
Configuring an Address Range as a Network Object
399
Configuring a Network as a Network Object
400
Configuring a Site as a Network Object
400
Configuring a Group as a Network Object
401
Configuring a Site Group as a Network Object
401
Remote Help
403
Web Remote Help
404
Turning on Web Remote Help on Endpoint Security Management Server
404
Configuring the Length of the Remote Help Response
404
Logging into Web Remote Help Portal
405
Configuring a Standalone Web Remote Help Server
406
Managing Web Remote Help Accounts
406
Configuring SSL Support for AD Authentication
411
Giving Remote Help to Full Disk Encryption Users
412
Media Encryption & Port Protection Remote Help Workflow
414
Disabling Remote Help
416
User-Bound Remote Help
417
Uninstalling the Endpoint Security Client Using Challenge-Response
418
Offline Mode
420
Configuring Offline Mode
421
Creating Offline Administrators
428
Editing Pre-Boot Users
429
Moving from Offline to Online Mode
431
Endpoint Offline Management Tool
432
Logging in to the Offline Tool
432
Password Assistance
432
Selecting a User
433
Challenge from User
433
Response to User
433
Disk Recovery
433
Select a User Account
433
Select Media
434
Uninstalling Endpoint Security Using Challenge-Response in Offline Mode
435
Glossary
439
Advertisement
Advertisement
Related Products
Check Point RR1-CP-25
Check Point RR1-CP-10
Check Point RR1-CP-20
Check Point R75.40VS
Check Point MAESTRO R80.20SP
Check Point R80.20
Check Point 12000
Check Point 12400
Check Point 12600
Check Point 1500 Series
Check Point Categories
Network Hardware
Firewall
Gateway
Power Supply
Server
More Check Point Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL