Download as pdf or txt
Download as pdf or txt
You are on page 1of 188

07 April 2022

HARMONY EMAIL &


COLLABORATION

Administration Guide
[Classification: Protected]
Important Information

Important Information
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.

Check Point Harmony Email & Collaboration

Latest Version of this Document in English


Open the latest version of this document in a Web browser.
Download the latest version of this document in PDF format.

Feedback
Check Point is engaged in a continuous effort to improve its documentation.
Please help us by sending your comments.

Related Documents

Document Title Description

Harmony Email & Harmony Email & Collaboration offers a rich set of REST API to
Collaboration API Reference manage and act on detected security events. For more details, see
Guide Harmony Email & Collaboration API Reference Guide.

Infinity Portal Administration Infinity Portal is the Check Point's Cloud web-based management
Guide platform that hosts the Check Point Security-as-a-Service (SaaS)
services. For more details, see Infinity Portal Administration Guide.

Harmony Email & Collaboration Administration Guide   |   2


Important Information

Revision History

Date Description

07 April 2022 n Added "Related Documents" on the previous page.


n Updated "Activating Office 365 Mail" on page 14.
n Updated "Activating Google Workspace (Gmail and Google Drive)" on
page 18.
n Updated configuration settings for DLP in "Data Loss Prevention" on
page 40.
n Added Source IP address for "SIEM Integration" on page 97.

01 April 2022 n Added "Anti-Phishing" on page 37.


n Updated "Appendix B: DLP Built-in Rules and Categories" on page 167.

22 March 2022 n Updated Google Workspace "Minimum Requirements" on page 12.


n Updated "DLP Subject Regular Expression (Regex)" on page 43.
n Updated "Data Loss Prevention (DLP) Policy" on page 68.

14 March 2022 n Added "End-User Daily Quarantine Digest" on page 120.


n Restructured the document.

01 March 2022 n Added "Data Loss Prevention" on page 40.


n Added "SIEM Integration" on page 97.
n Added "Appendix B: DLP Built-in Rules and Categories" on page 167.

17 February 2022 n Added "Spam Workflow" on page 67.


n Updated "Anomaly Detection" on page 128.
n Added "Click-Time Protection" on page 48.

15 February 2022 n Updated "Activating Office 365 Mail" on page 14.


n Updated "Step 2 - Journal Rule" on page 140.

08 February 2022 n Added "Assigning Roles and Permissions" on page 29.


n Updated "Data Retention Policy for Emails" on page 32.
n Added "Email Protection" on page 51.

03 February 2022 n Updated "Minimum Requirements" on page 12.


n Updated Backward scanning period in "Onboarding Next Steps" on
page 28.
n Updated Analytics for "Office 365 Email and Gmail" on page 78.
n Added "Data Retention Policy for Emails" on page 32.

31 January 2022 n Rebranded Harmony Email & Office to Harmony Email & Collaboration.
n Integrated Harmony Email & Office Getting Started Guide, Harmony Email
& Office Threat Protection Administration Guide, and Harmony Email
& Office Manual Configuration with Office 365 Administration Guide into
Harmony Email & Collaboration Administration Guide.
n Updated Harmony Email & Collaboration "Minimum Requirements" on
page 12.

07 January 2022 Rebranded CloudGuard SaaS to Harmony Email & Office.

Harmony Email & Collaboration Administration Guide   |   3


Table of Contents

Table of Contents
Introduction 10
Overview 10
About this Guide 10
Getting Started 11
Activating Harmony Email & Collaboration 11
Activating SaaS Applications 12
Minimum Requirements 12
Overview 13
Activating Office 365 Mail 14
Activating Microsoft OneDrive 17
Activating Google Workspace (Gmail and Google Drive) 18
Before Activating Google Workspace 18
Activating Gmail 18
Activating Google Drive 23
Google Workspace Footprint 25
Super Admin 25
Super Admin Security 25
User Groups 26
Host 26
Inbound Gateway 26
SMTP Relay Service 27
Content Compliance Rules 27
Onboarding Next Steps 28
Assigning Roles and Permissions 29
Roles 29
Per-Role Permissions 29
Configurable Permissions - Default 30
Overriding Default Permissions 30
Data Retention Policy for Emails 32
Introduction 32
Retention Period 32
Available Actions on Emails During and After the Retention Period 33
Configuring Security Engines 37

Harmony Email & Collaboration Administration Guide   |   4


Table of Contents

Anti-Phishing 37
Phishing Threshold 37
Nickname Impersonation 37
Protection Against Executive Spoofing 37
Configuring Nickname Impersonation 37
Best Practices for Detecting Nickname Impersonation 38
Handling False Positives 38
Anti-Phishing Exceptions 39
Anti-Phishing Block-List 40
Data Loss Prevention 40
Overview 40
Benefits 40
Enforcing the DLP Definitions 41
Configuring DLP Engine 41
Configuring DLP Categories 41
Storage of Detected Strings 42
Minimal Likelihood 42
DLP Subject Regular Expression (Regex) 43
Customizing DLP Rule Parameters 43
Match Hit Count Settings 43
Occurrence Threshold 43
Likelihood Adjustment 43
Hot/Cold Words 44
Creating Custom DLP Rules 44
Regular Expression 44
Compound DLP Rules 45
Creating a Compound DLP Rule 46
Other Types of Custom DLP Rules 47
Forensics 47
Click-Time Protection 48
Benefits 48
Click-Time Protection Behavior 48
Configuring Click-Time Protection 49
Forensics 50
Email Protection 51

Harmony Email & Collaboration Administration Guide   |   5


Table of Contents

Overview 51
Office 365 Mail 53
Overview 53
How it Works 53
Required Permissions 54
Activating Office 365 Mail 56
Office 365 Mail Security Settings 56
Quarantine Settings 56
Notification Templates and Senders 56
Available configurable templates 56
Google Gmail 57
Overview 57
How it Works 58
Required Permissions for Gmail 58
Required Permissions for Google Drive 59
Activating Gmail 60
Gmail Security Settings 60
Quarantine Settings 60
Notification Templates and Senders 60
Available configurable templates 60
Configuring Email Policy 61
Threat Detection Policy 61
Configuring a Threat Detection Policy Rule 61
Phishing Protection 62
Phishing Workflow 62
Suspicious Phishing Workflow 63
Malware Workflow 64
Threat Extraction Workflow 65
Spam Workflow 67
Notification Settings 67
Warning Banners 68
Data Loss Prevention (DLP) Policy 68
DLP Policy for Outgoing Emails 68
DLP Workflows for Outgoing Emails 69
DLP Alerts for Outgoing Emails 70

Harmony Email & Collaboration Administration Guide   |   6


Table of Contents

Outgoing Email Protection - Office 365 Footprint 70


Transport rules 70
Connectors 72
Office 365 Email Encryption for Outgoing Emails 73
Required License for Encrypting Outgoing Emails 73
Encrypting Outgoing Emails 73
DLP Policy for Incoming Emails 73
DLP Workflows for Incoming Emails 74
DLP Alerts for Incoming Emails 74
Click-Time Protection Policy 74
Click-Time Protection Exceptions 74
Managing Security Events 76
Security Events View 76
Filters 76
Analytics Dashboard 77
Viewing Analytics 77
Office 365 Email and Gmail 78
Office 365 OneDrive 79
Google Drive 80
Shadow IT 80
Check Point's Approach to Shadow IT in Harmony Email & Collaboration 80
Shadow IT Dashboard and Events 80
Summary Report 81
Reviewing Phishing Events 81
Reviewing Malware Events 82
Office 365 Email - User Reported Phishing 85
Benefits 85
Enabling User Reported Phishing in Infinity Portal 85
Enabling Email as Phishing Option in Outlook 85
Reporting Email as Phishing from Outlook 86
Web Client 86
Desktop Client 86
User Reported Phishing Screen 87
Available Actions 88
Viewing All Emails / Files / Messages 89

Harmony Email & Collaboration Administration Guide   |   7


Table of Contents

Mail Explorer 89
Custom Queries 90
Creating and Saving a New Query 90
Editing the Query's Columns and Conditions 90
Bulk Actions on Query Results 92
Exporting a Query's Results 92
Scheduled reports based on Custom Query results 93
Using a Query as a Detect and Prevent Policy Rule 93
Manually Sending Items to Quarantine 94
Single Item Quarantine 94
Bulk Manual Quarantine Process 96
Query based Quarantine Process 96
Audit Trail 97
System Logs 97
SIEM Integration 97
Source IP Address 97
Configuring SIEM Integration 97
Configuring AWS S3 to Receive Harmony Email & Collaboration Logs 98
Configuring AWS S3 to Send Harmony Email & Collaboration Logs to Splunk 107
Recommended Configuration for known SIEM Platforms 118
Managing Quarantine 120
Quarantined Items 120
Threat Extracted Emails 120
End-User Daily Quarantine Digest 120
Configuring Daily Quarantine Digest 121
Managing Restore Requests 122
Quarantine Restore Requests 122
End-User Quarantine Release Process 123
Admin Quarantine Release Process 123
Extracted Restore Requests 124
Dedicated Quarantine Mailbox / Folder 124
Office 365 Mail 124
Gmail 125
Restore Request Approver 126
Office 365 Email 126

Harmony Email & Collaboration Administration Guide   |   8


Table of Contents

Gmail 126
Anomaly Detection 128
Configuring Anomaly Detection 128
Supported Anomalies 129
Managing Licenses 131
License configuration while onboarding 131
License assignment with a commercial contract 131
License configuration after onboarding 133
Manual changes to license assignment 135
Appendix 136
Appendix A: Check Point Manual Integration with Office 365 136
Policy Modes 137
Step 1 - Check Point Contact 137
Step 2 - Journal Rule 140
Step 3 - Connectors 142
Step 4 - Connection Filter (All Modes) 148
Step 5 - On-boarding (Monitor only & Detect and Prevent) 149
Step 6 - Quarantine Mailbox (for Office 365 Mail Only) 151
Introduction - Protect (Inline) Mode 152
Step 7 - Protect (Inline) Policy Configuration on Harmony Email & Collaboration 152
Step 8 - Connectors (Protect (Inline) Mode) 153
Step 9 - Transport Rules (Protect (Inline) Mode) 157
Check Point - Protect 157
Check Point - Allow-List 161
Check Point - Junk Filter 163
Transport Rules 165
Appendix B: DLP Built-in Rules and Categories 167
DLP Rules 167
DLP Categories 182
Appendix C: Troubleshooting 186

Harmony Email & Collaboration Administration Guide   |   9


Introduction

Introduction
Overview
SaaS applications deliver many benefits to businesses of all sizes, but expose them to risks from advanced
threats largely because of unauthorized access to corporate SaaS accounts. Harmony Email &
Collaboration provides complete protections against even the most sophisticated malware and zero-day
threats while easily preventing account breaches.
n Zero-Day Threat Protection
n Phishing Protection Identity
n Prevent Account Takeover
n Data Leakage Prevention
n SaaS Shadow IT Discovery
n Intuitive Cloud Management

About this Guide


This guide describes how to protect cloud email and collaboration suites using Harmony Email &
Collaboration.
Learn how to:
n Activate the protection for supported SaaS (Software as a Service) applications.
n Navigate the portal for each menu item.
n Configure and add policy rules to fit your security needs.
n Review events.
n Quarantine emails and files.
n Work with custom queries.

Harmony Email & Collaboration Administration Guide   |   10


Getting Started

Getting Started
Activating Harmony Email & Collaboration
Harmony Email & Collaboration's auto-deployment is a three step set up process that enables security
admins to deploy instantly and fine-tune security policies. After Harmony Email & Collaboration is deployed,
it does a retroactive scan to find existing threats in your organization to ensure maximal security posture
from the start.
During deployment of Harmony Email & Collaboration, configuration changes are added to protected SaaS
applications.

To activate Harmony Email & Collaboration:


1. Log in to the Infinity Portal.
If you don’t have an Infinity Portal account, create an account. For more details, refer to Infinity Portal
Administration Guide.

2. Click on the menu icon and select Harmony Email & Collaboration.

Harmony Email & Collaboration Administration Guide   |   11


Getting Started

3. Accept the terms of service and click Try Now.

Now, you can start using Harmony Email & Collaboration.


To start activating the SaaS applications, see "Activating SaaS Applications" below.

Activating SaaS Applications


Minimum Requirements
The table below shows the SaaS licenses required for Harmony Email & Collaboration.

SaaS Minimum License Other Supported


Licenses Not Supported
Application Required Licenses

Office 365 Business Essential n Business —


n Business Premium
Note - Harmony
Email & Collaboration does
Note - Government
not support Public Folders.
accounts require manual
onboarding.

Harmony Email & Collaboration Administration Guide   |   12


Getting Started

SaaS Minimum License Other Supported


Licenses Not Supported
Application Required Licenses

Google n Gmail - Supports all n Business Starter n Business Starter


Workspace licenses (only for Gmail) (only for Google
n Google Drive: n Business Standard Drive)
Business Standard n Business Plus n G Suite legacy
n Enterprise n Google Apps
n Frontline
Note - In case
"Comprehensive mail
storage" is enabled, Protect
(Inline) mode is not
supported.

Box Enterprise — n Starter


n Business
n Business Plus

Dropbox Advanced Enterprise Standard Business

Slack Enterprise — n Free


n Pro
n Business+

Citrix Supports all the licenses — —


ShareFile

Overview
After activating your Check Point's Infinity Portal and have logged into the system, you can start monitoring
your SaaS applications.

Workflow:

Step Description

1 Getting Started Wizard opens after activating Harmony Email &


Collaboration.

2 Start activating the SaaS application(s) required.

3 Navigate to Threat Protection > Overview and begin monitoring.

To begin the Getting Started wizard:


1. Click Let's Get Started. 
The Cloud App Store screens opens.
2. Select the SaaS application you want to activate.

Harmony Email & Collaboration Administration Guide   |   13


Getting Started

Activations are done through OAuth and require admin-level authentication and authorization. Make
sure you have the admin-level credentials available for the SaaS you select to activate.
Notes:
n The procedure to activate the SaaS application varies according to the application you select.
n When a SaaS application is activated, it automatically starts the Monitor only mode. There is no
change to the end-user's experience and no action or remediation is taken. However, you can already
see events generated from the Infinity Portal.

Activating Office 365 Mail


Important - To activate Office 365 Mail, you must have administrator access to Office 365. In
addition, the quarantine mailbox requires a mailbox license which is managed by your company
in Office 365. This license is not created automatically by Harmony Email & Collaboration (even
when choosing the Automatic Mode for onboarding).

To activate Office 365 Mail:

Step Description

1 From the Getting Started Wizard click Start for Office 365 Mail.
or
Navigate to Threat Protection > Config > Cloud App Store and click Start for Office 365 Mail.

2 Select the mode of operation for Office 365.


n Automatic mode
Harmony Email & Collaboration automatically configures Office 365 emails to operate
in Monitor only mode.
n Manual mode
You must manually perform the necessary configurations in the Office 365 Admin
Exchange Center before you bind the application to your Office 365 email account, and
every time you add or edit the security policy associated with Office 365 emails. For
more information, see "Appendix A: Check Point Manual Integration with Office 365" on
page 136.

Harmony Email & Collaboration Administration Guide   |   14


Getting Started

Step Description

3 Accept the terms of service and click Ok.

4 In the Office 365 Authorization window that appears, sign in with your Microsoft administrator
credentials.
Note - Authentication is performed by Microsoft and these credentials are not provided by
Check Point.

Harmony Email & Collaboration Administration Guide   |   15


Getting Started

Step Description

5 In the authorization screen, click Accept to grant necessary permissions to Harmony Email &
Collaboration.

The Office 365 Mail SaaS is enabled and monitoring begins immediately.

Harmony Email & Collaboration Administration Guide   |   16


Getting Started

Step Description

Note - By default, Monitor only mode is assigned for all the SaaS applications you connect to. This allows
you to immediately see the value that Harmony Email & Collaboration brings as it recognizes security
incidents that occurred before on your SaaS platform. To configure email protection, see "Configuring Email
Policy" on page 61.

Activating Microsoft OneDrive


Important - To activate OneDrive, you must have administrator access to Office 365.

To activate OneDrive:

Step Description

1 From the Getting Started Wizard or from the Cloud App Store, click Start for Microsoft
OneDrive.
The Authorization Scope window opens.

Harmony Email & Collaboration Administration Guide   |   17


Getting Started

Step Description

2 The Force Admin checkbox asks if you authorize the admin account to have access to all files
and folders on OneDrive.
This is needed if you want to monitor changes and security-risks across all files and folders.

Best Practice - Select this checkbox.

Note - OneDrive end-users might notice that the administrator now has permissions
to their files and folders.

3 Click Next.
You can now see the permissions:

4 Click OK to review and accept the list of permissions to grant Harmony Email & Collaboration.

5 Click Accept.
Microsoft OneDrive is activated and the monitoring begins immediately.

Activating Google Workspace (Gmail and Google Drive)


Before Activating Google Workspace
n You must have administrator access to activate Google Workspace.
n If MFA is activated by default for all the global administrators in your organization, change the setting
before onboarding in Harmony Email & Collaboration.
n If you use GCDS (Google Cloud Directory Sync) to synchronize your user groups on-premises and in
the cloud, you must create exclusion rules for check_point_inline_policy and check_point_monitor_
policy before activating Google Workspace. For details, see "User Groups" on page 26.
By default, the Google Chrome browser authenticates the signed in Chrome user in Google Workspace
instead of a selected account. To see if you are signed in to Google Chrome, look for the user name at the
top-right corner of the browser.
Possible workarounds:
n Perform the Google Workspace activation using a non-Chrome browser.
n Sign out (switch to Guest) any logged-in Chrome user before you continue.

Activating Gmail

To activate Gmail:

Step Description

1 Navigate to Threat Protection > Config > Cloud App Store.

Harmony Email & Collaboration Administration Guide   |   18


Getting Started

Step Description

2 Click Start for Gmail.

3 Log in to the Google Workspace Marketplace using your Google administrator


credentials.

Harmony Email & Collaboration Administration Guide   |   19


Getting Started

Step Description

4 After successful authentication you will be redirected to the Check Point Cloud
Security app installation page.
Click Admin Install.

5 In the Admin install pop up that appears, click Continue.

Harmony Email & Collaboration Administration Guide   |   20


Getting Started

Step Description

6 Check Point Cloud Security app requests for permissions to access your data.
Select Everyone at you organization, accept the terms of service and click Finish.

Harmony Email & Collaboration Administration Guide   |   21


Getting Started

Step Description

7 Wait until the Check Point Cloud Security app is installed.


After installation, the page appears like this.

8
Click in the Google Workspace Marketplace. Scroll down and select the Check
Point Cloud Security app.

If prompted, enter the Google administrator credentials and you are redirected to the
Check Point's Harmony Email & Collaboration.

Note - After you install the Check Point Cloud Security app, a new Super Admin
account is created in your Google Admin console. For details, see "Super Admin" on
page 25.

Harmony Email & Collaboration Administration Guide   |   22


Getting Started

Step Description

9 Navigate to Threat Protection > Config > Cloud App Store and click Start for Gmail.

After successful authentication, Harmony Email & Collaboration starts scanning the
users and emails from Gmail.

Activating Google Drive

Step Description

1 Navigate to Threat Protection > Config > Cloud App Store.

2 Click Start for Google Drive.

Harmony Email & Collaboration Administration Guide   |   23


Getting Started

Step Description

3 Log in to the Google Workspace Marketplace using your Google administrator


credentials.

Harmony Email & Collaboration Administration Guide   |   24


Getting Started

Step Description

4 If Gmail is already activate in Harmony Email & Collaboration, after successful


authentication, Harmony Email & Collaboration starts scanning the Google Drive of
users.
If Gmail is not active, continue steps 3-9 from "Activating Gmail" on page 18.

For more details about automatic configuration on Google Workspace, see "Google Workspace Footprint"
below.

Google Workspace Footprint


After "Activating Google Workspace (Gmail and Google Drive)" on page 18, Harmony Email & Collaboration
automatically creates a Super Admin, host (mail route), inbound gateway, SMTP relay service, two user
groups, and four content compliance rules.

Super Admin

After you install the Check Point Cloud Security app, a new Super Admin account is created in your
Google Admin console.
The Super Admin has an email address in the cloud-sec-av@[domain] format and is sometimes referred to
as the Check Point Service User.
This user requires a Gmail license. For more details about Super Admin role, see Pre-built administrator
roles.

Super Admin Security

The password of the Super Admin contains 43 random characters; a mix of lower case letters, upper case
letters, and digits.

Harmony Email & Collaboration Administration Guide   |   25


Getting Started

You cannot change the password after the initial setup and cannot protect the Check Point Service User
account with Multi-Factor Authorization (MFA).
Note - If MFA is activated by default on all global administrators, change the setting before onboarding in
Harmony Email & Collaboration. If you already onboarded with MFA enabled, contact Check Point Support.

User Groups

After activating Google Workspace, Harmony Email & Collaboration automatically creates 2 user groups.
You can review these user groups under Groups in your Google Admin console.
n check_point_inline_policy
n check_point_monitor_policy
If you use GCDS (Google Cloud Directory Sync) to synchronize your user groups on-premises and in the
cloud, the synchronization triggers the deletion of these two Check Point groups. Though this will not impact
the email delivery, Harmony Email & Collaboration cannot scan the emails and no security events get
generated.
Before activating Google Workspace, create two exclusion rules for the two user groups. Select the
exclusion type as Group Email Address , match type as Exact Match and the group email address should
be in the groupname@[domain] format.
For example, the group email addresses should be check_point_inline_policy@mycompany.com and
check_point_monitor_policy@mycompany.comwhere mycompany is the name of your company.
Note - If you already activated Google Workspace without creating exclusion rules, contact Check Point
Support.

Host

Harmony Email & Collaboration automatically creates a host (aka mail route) in your Google Admin console.
You can see the host from the Google Admin Console, under Apps > G Suite > Settings for Gmail > Hosts.

Inbound Gateway

Harmony Email & Collaboration automatically creates an Inbound gateway. You can see the inbound
gateway from the Google Admin console, under Apps > G Suite > Settings for Gmail > Advanced Settings.

Harmony Email & Collaboration Administration Guide   |   26


Getting Started

SMTP Relay Service

Harmony Email & Collaboration automatically creates an SMTP relay service. You can see the SMTP relay
service from your Google Admin console, under Apps > G Suite > Settings for Gmail > Advanced Settings.

Content Compliance Rules

Harmony Email & Collaboration automatically creates three Content Compliance Rules. You can review the
content compliance rules from your Google Admin console, under Apps > G Suite > Settings for Gmail >
Advanced Settings. The rules are called:
n [tenantname]_monitor_ei
n [tenantname]_monitor_ii
n [tenantname]_monitor_eo
n [tenantname]_inline_ei
where ei stands for incoming traffic, ii stands for internal traffic, and eo stands for outgoing traffic.

Harmony Email & Collaboration Administration Guide   |   27


Getting Started

Note - The [tenantname]_inline_ei rule gets created when the Protect (Inline) mode is enabled. If you
remove the Protect (Inline) mode for users in Harmony Email & Collaboration, the Content Compliance
Rule remains in the Google Admin console but the content of the user group check_point_inline_rule gets
updated to reflect that no users are protected in this mode.

Onboarding Next Steps


After you activate the Harmony Email & Collaboration application(s), this is what happens next:
n Backward scanning (occurs in parallel with live scanning)

After activating the SaaS application, Harmony Email & Collaboration performs backward
scanning of its content.
The backward scanning period for SaaS applications are as follows:

SaaS Application Scanning Period

Microsoft 365 Email 14 days

Google Workspace Gmail 14 days

Microsoft OneDrive 14 days

Google Workspace Drive 30 days

Slack No backward scanning

Microsoft Teams No backward scanning

Microsoft SharePoint 14 days

Citrix ShareFile 14 days

Dropbox 14 days

Box 14 days

Note - In case you wish to extend the scanning period, contact the Check Point Support.

n Live scanning - Scan all files and emails in real time

The Overview page starts populating with security events. At the bottom of the overview screen,
you can see the status of active scans of your SaaS applications. Depending on the amount of
data, this stage may take a while.

Note - The number of active users may exceed the number of licensed users
in the SaaS and does not necessarily reflect the number of Harmony Email &
Collaboration licenses required.

Click Active users to review the list of users. This opens a pre-existing query in the Analytics tab >
custom queries.
For example, in Office 365, Shared Mailboxes do not require a separate license in Harmony Email
& Collaboration but are counted as active users.

Harmony Email & Collaboration Administration Guide   |   28


Getting Started

n Detect policies are in place for threats (phishing and malware)

You can review the default policies in the Policy tab.


For DLP, there is no default policy.

Assigning Roles and Permissions


Harmony Email & Collaboration is a part of Check Point’s Infinity Portal. Therefore, administrative users with
access to the Harmony Email & Collaboration are managed globally in the Infinity Portal.
Each Infinity Portal user is assigned two types of roles:
n Global Role – Default role for every application in the Infinity Portal.
n Specific Service Role – Specific role for each application, overriding the global role.
For example, a user can have a Read-Only global role in the Infinity Portal but an Admin role
specifically for Harmony Email & Collaboration. These roles allow this user to be an admin
responsible for Harmony Email & Collaboration service, while this user will have only Read-Only
access to other services.
For more details about managing roles, their authentication (including Single Sign-On, SSO), roles, and
permissions in the Infinity Portal, refer to Global Settings > Users in Infinity Portal Administration Guide.

Roles
Each user is assigned one of these roles in Harmony Email & Collaboration:
n Admin
n Help Desk
n Read-Only

Per-Role Permissions
The table below describes the default permissions of the Admin, Read-Only, and Help Desk roles in
Harmony Email & Collaboration:

SaaS Events,
SaaS Applications Policy Custom Quarantine, Sensitive
Role
Applications and Security Rules Queries and Data *
Engines Exceptions

Admin View and View and View and View, View, edit, Can't view
connect or configure configure edit, and and take (explicit
disconnect take actions permissions
actions required)

Read- Can not view Can not view Can not View- View-Only Can't view
Only view Only (explicit
permissions
required)

Harmony Email & Collaboration Administration Guide   |   29


Getting Started

SaaS Events,
SaaS Applications Policy Custom Quarantine, Sensitive
Role
Applications and Security Rules Queries and Data *
Engines Exceptions

Help Can not view Can not view Can not View and View, edit Can't view
Desk view edit (no and take (explicit
actions) actions permissions
required)

* Sensitive data includes email body, email headers, ability to download files, messages, and viewing
strings from emails/files/messages caught as DLP violations.

Configurable Permissions - Default


By default, every administrative user regardless of the role, has these permissions:
n No access to sensitive data
n No pre-check for alerts *
n Receives weekly reports
* In every policy rule, alerts can be configured to be sent to specific admins. When selecting the admins, by
default no admin will be pre-checked in the list that opens.

Overriding Default Permissions


To override the default permissions, the Specific Service Roles for Harmony Email & Collaboration are as
follows:

Role Description

Disable Receiving Weekly Stops sending weekly reports to users with this role.
Reports

Harmony Email & Collaboration Administration Guide   |   30


Getting Started

Role Description

Receive Alerts by Default Sends email alerts to users with this role.
When this role is applied to a user, the system automatically pre-
checks the user under Select users who will receive alerts page in
Alerts > Select Users.

View Sensitive Data only if Allows the user to access the sensitive data* only for
Threats are Found emails/files/messages flagged as containing threats.

View All Sensitive Data Allows the user to access sensitive data*.

* Sensitive data includes email body, email headers, ability to download files, messages, and viewing
strings from emails/files/messages caught as DLP violations.

To add Specific Service Roles:

Step Description

1 From the left navigation panel, click Global Settings in the Infinity Portal.

2 From the top left section, click Users.


It shows the list of currently defined users.

3 Select the user and click Edit from the top toolbar.
If the user is not available, add the user to the Infinity Portal.
For more details, see Infinity Portal Administration Guide.

4 From the Edit window, click Specific Service Roles.

Harmony Email & Collaboration Administration Guide   |   31


Getting Started

Step Description

5 Expand Harmony Email & Collaboration and select the service roles.

6 Click Save.

Data Retention Policy for Emails


Introduction
The Data Retention Policy describes how long Harmony Email & Collaboration stores emails from Microsoft
365 or Gmail in its database. You can search and view emails stored in the database using "Viewing All
Emails / Files / Messages" on page 89 and "Custom Queries" on page 90.

Retention Period
Harmony Email & Collaboration retains the emails as follows:

Retention period (in Days)

Email Type Email Message Email Metadata


(Original email (Attributes and data detected
with attachments) from the security scan)

Clean Email (not flagged by any security 14 14


engines)

Harmony Email & Collaboration Administration Guide   |   32


Getting Started

Retention period (in Days)

Email Type Email Message Email Metadata


(Original email (Attributes and data detected
with attachments) from the security scan)

Detected but non-quarantined email (flagged 14 180


by at least one security engine)

Quarantined email 180 180

Note - Harmony Email & Collaboration keeps backend logs on emails for seven days after the email is
delivered.

Available Actions on Emails During and After the Retention


Period
Actions you can perform after you open an email:

Harmony Email & Collaboration Administration Guide   |   33


Getting Started

Email Type Period Actions

Clean Email During the retention period (< 14 n Quarantine Email


days) n Show header from
raw email
n Show body from
raw email
n Download this
email
n Report mis-
classification

After the retention period (> 14 days) Email is not available.

Harmony Email & Collaboration Administration Guide   |   34


Getting Started

Email Type Period Actions

Detected but non-quarantined During the retention period (< 14 n Quarantine Email
email days) n Show header from
raw email
n Show body from
raw email
n Download this
email
n Send Original
Email
n Report mis-
classification

After the retention period (14 - 180 n Quarantine Email


days) n Show header from
raw email
n Show body from
raw email
n Report mis-
classification

After 180 days Email is not available.

Harmony Email & Collaboration Administration Guide   |   35


Getting Started

Email Type Period Actions

Quarantined email During the retention period (< 180 n Restore Email
days) n Show header from
raw email
n Show body from
raw email
n Download this
email
n Report mis-
classification

After the retention period (> 180 Email is not available.


days)

Harmony Email & Collaboration Administration Guide   |   36


Configuring Security Engines

Configuring Security Engines


Anti-Phishing
Phishing Threshold
The machine learning Anti-Phishing algorithm returns a verdict on each email analyzed with a confidence
that may go from Lowest to Highest.
Any email categorized as Phishing with a confidence level equal to or greater than the Phishing Threshold
(PT) generates a phishing security event.
Any email categorized as phishing with the confidence level down by one from the phishing threshold (for
example, PT is "High" and confidence level of verdict is "Medium") triggers the creation of a Suspicious
event.
By default, the Phishing Threshold is set to "High".

Best Practice - We recommend you adjust it based on the false positive/false negative
rate observed when looking at phishing events triggered by Anti-Phishing.

Nickname Impersonation
Protection Against Executive Spoofing
Executive spoofing is a scam in which cyber criminals impersonate the names and emails of company
executives to try and fool an internal employee into disclosing sensitive information or executing a payment.
Anti-Phishing has a setting that allows Infinity Portal administrators to automatically block such spoofing
attempts.

Configuring Nickname Impersonation


Infinity Portal administrators can trigger the “Phishing” or “Suspicious Phishing” workflows when Anti-
Phishing detects a nickname impersonation.

To configure nickname impersonation, follow these steps.


1. Navigate to Threat Protection > Config > Security Engines.
2. Click Configure for Anti-Phishing.

Harmony Email & Collaboration Administration Guide   |   37


Configuring Security Engines

3. Select the scope of users:


n Important/key people
Note - By default, Anti-Phishing references the job title of the user to determine the seniority.
Examples of senior titles are CEO, CFO, etc. Alternatively, you can define your own senior
users by creating a security group (in Office 365 or Gmail) for senior-level users, and entering
the exact name of the security group in the designated field. This field is case sensitive.
n All internal users
4. Select the Phishing or Suspicious workflow for detections.

Best Practices for Detecting Nickname Impersonation


n It is recommended to start protecting a small group of senior-level people first and then expand it to
other people and/or use the Suspicious workflow.
n If you wish to extend nickname impersonation workflows for all internal users, it is recommended to
use the Suspicious workflow to avoid false positive detections.
n Protected users must be informed to not use their personal email addresses, as these will be
detected as impersonations.
Note - Anti-Phishing always looks for nickname impersonations for all users.

Handling False Positives


Many commonly used services like Salesforce or ServiceNow sends legitimate emails on behalf of other
users. The Anti-Phishing engine detects these emails as nickname impersonations. Therefore, it’s important
to ensure that this configuration is not generating false positive phishing/suspicious detections.

Harmony Email & Collaboration Administration Guide   |   38


Configuring Security Engines

To monitor detections, create "Custom Queries" on page 90 that filters the detections containing nickname
impersonations.
Note - Since Impersonation detection takes priority, sometimes an Allow-List rule will be overridden due to
an SPF failure. If you need to ensure that an email is not overridden by an SPF failure or suspected
impersonation, edit the Allow-List rule to Ignore SPF check.

Ensure to add legitimate services to Allow-List that appear in the query by navigating to Threat Protection >
Config > Anti-Phishing Allow-List.
For more details, contact Check Point Support.

Anti-Phishing Exceptions
In this screen you can manage exceptions for the Anti-Phishing algorithm. As explained in "Reviewing
Phishing Events" on page 81, you can set exceptions for the Anti-Phishing algorithm from a specific event.
You can also add exceptions directly in this screen.

Note - An email matching one of the criteria of exception for Anti-Phishing is still
inspected by the other security engines such as URL Reputation, Threat Emulation, and
others.
Available exceptions

Name Description

Excluded This will not scan an email with the Anti-Phishing algorithm if the email address of
Emails the sender is in the list.

Excluded IPS This will not scan an email with the Anti-Phishing algorithm if the IP Address of the
sender is in the list.

Harmony Email & Collaboration Administration Guide   |   39


Configuring Security Engines

Name Description

Excluded This will not scan an email with the Anti-Phishing algorithm if the domain of the
Domains sender is in the list.

Excluded This will not scan an email with the Anti-Phishing algorithm if the nickname of the
Nicknames sender is in the list.

Excluded This section shows exceptions set by users themselves. When the workflow for
Emails Per phishing defined in policy is to add a warning to email subject, Harmony Email &
Owner Collaboration will sometimes add a banner at the top of the email "Do you trust this
sender - Yes or No". If the user clicks Yes, then an exception is added under this tab
for this specific recipient and sender.

Anti-Phishing Block-List
When opening an email's event details, not flagged as being a phishing email by the Anti-Phishing
algorithm, Mark as phishing option is shown.
You can mark the email under review as phishing as well as previous emails based on the criteria you
select.
Additionally, any future email matching those criteria is handled as phishing.
You can review and remove Block-List rules under Threat Protection > Config > Anti-Phishing Block-List.

Data Loss Prevention


Overview
Harmony Email & Collaboration's Data Loss Prevention (DLP) engine helps to protect the organization's
data from potential data breaches or data ex-filtration transmissions. The DLP engine scans emails and text
messages posted on the collaboration platforms and detects data patterns that should not be shared with
unauthorized persons or targets. It can also extract text from images. More than 3000 file types are
supported.
The DLP enables you to create universal policies across multiple cloud applications to control how files are
shared amongst internal and external users. DLP identifies and marks files containing confidential, financial,
and personally identifiable information, including: credit card numbers, social security numbers, bank
routing numbers, or data protected under HIPAA, etc.

Benefits
n Scan emails and files for sensitive information with ease by using a common solution for all platforms.
n Stop data leakage by using automated actions.
n Generate actionable alerts.
n Use an integrated solution for DLP and other attacks, such as phishing and malware.
n Built-in DLP detection rules and categories. See "Appendix B: DLP Built-in Rules and Categories" on
page 167.

Harmony Email & Collaboration Administration Guide   |   40


Configuring Security Engines

Enforcing the DLP Definitions


The "Configuring DLP Engine" below describes the definitions of the DLP engine. After the DLP engine is
configured, a DLP policy needs to be defined for the DLP to be enforced.
For more details, see "Data Loss Prevention (DLP) Policy" on page 68.

Configuring DLP Engine


To configure DLP engine, follow these steps:
1. Navigate to Threat Protection > Config > Security Engines.
2. Choose DLP and click Configure.

3. Configure the different configuration options as described below and click Save.

Configuring DLP Categories


You can configure the DLP policy with DLP categories as the matching criteria. These DLP categories have
several DLP rules.
For example, the PII DLP category includes the Passport Number DLP rule.

Harmony Email & Collaboration Administration Guide   |   41


Configuring Security Engines

To add or remove DLP Rules from DLP Categories:


1. Navigate to Threat Protection > Config > Security Engines.
2. Click Configure for DLP.
3. Scroll down to Detection Types and find the relevant DLP category.
4. Edit the list of DLP Rules under the category.
5. Click Save.
For more information about the default DLP rules and their DLP categories, see "Appendix B: DLP Built-in
Rules and Categories" on page 167.

Storage of Detected Strings


When the DLP engine matches strings to a DLP rule, Harmony Email & Collaboration stores these strings
and displays them for administrators with sufficient permissions when they investigate the security events.
Since these strings are considered sensitive and private end-user data, you can select how they are stored
and presented in the system called Detected Text Storage Mode.

To update Detected Text Storage Mode:


1. Navigate to Threat Protection > Config > Security Engines.
2. Click Configure for DLP.
3. Scroll down to Detected Text Storage Mode and select one of these options.
n Store detected text strings (default): This is the default option, and the detected data is saved
and displayed on the security events for the forensic process.
n Obfuscate detected text prior to storage: Detected data is saved and displayed on the
security events obfuscated. The original data is discarded and cannot be accessed.
n Do not store detected text: No detected data is stored or displayed on the security events.
4. Click Save.

Minimal Likelihood
Whenever the DLP engine detects a possible data leak, it assigns the detection a Likelihood level.
Likelihood levels are mostly affected by context around the detected strings.
For example, when a Social Security Number (SSN) is discovered, the DLP engine also checks for the
presence of relevant strings close to the discovered pattern, i.e., "SSN" or "Social Security."

Likelihood scale:
n Very Unlikely
n Unlikely
n Possible
n Likely
n Very Likely

Harmony Email & Collaboration Administration Guide   |   42


Configuring Security Engines

DLP Subject Regular Expression (Regex)


You can add a subject regular expression as the matching criteria to every DLP policy.
Note - If an email subject contains a string that matches this regular expression, the policy rule will be
matched, regardless of the data types.
For more details, see "Data Loss Prevention (DLP) Policy" on page 68.
Example: The security team sets the pattern as [SECURE] while configuring the DLP Engine. All the emails
sent by the users with the pattern are automatically encrypted, even if no data type is detected in the email.
If the DLP Engine detects a violation and the subject doesn't contain the pattern, it means the user
unknowingly sent sensitive information. This helps the security team act on these cases to educate the
users.
Notes:
n It is recommended to use simple regex control characters to simplify the pattern (“.*)
n By default, this feature is turned off. To enable this feature, open a support ticket or contact Check
Point Support.

Customizing DLP Rule Parameters


To refine the definitions of a DLP category or to handle cases of false-positive detections, you can control
how to match a DLP rule in an email/file/message.

Match Hit Count Settings


By default, a DLP rule's hit count increases every time a string in the email/file/message matches with the
DLP rule’s definitions. If the same matched string appears multiple times in the email/file/message, the hit
count increases accordingly.
To configure Harmony Email & Collaboration to ignore duplications of the same string when calculating the
hit count, check the Unique detections only box in the Configure DLP window.

Occurrence Threshold
By default, if a DLP rule is matched X times, the hit count of the DLP Category containing this DLP rule
increases by X.
Setting the occurrence threshold for the DLP rule to Y means that:
n If the DLP rule matches < Y times, the hit count of the containing DLP Category will not be increased
at all.
n If the DLP rule matches >= Y times, the hit count of the containing DLP Category will be increased by
the total number of matches.
To configure Occurrence Threshold, open a support ticket or contact Check Point Support.

Likelihood Adjustment
By default, the DLP engine returns a specific likelihood level ("Minimal Likelihood" on the previous page) to
a DLP Category.

Harmony Email & Collaboration Administration Guide   |   43


Configuring Security Engines

If you want to determine if one of the DLP Rules is matched, the likelihood will automatically increase or
decrease. You can configure the Likelihood Adjustment value for every DLP Rule with positive or negative
values accordingly.
To configure Likelihood Adjustment, open a support ticket or contact Check Point Support.

Hot/Cold Words
Every DLP Rule is searched across the entire email/file/message by default.
Administrators can define the scope of the search so that it happens in the vicinity of certain words and/or
not in the vicinity of others.
To configure Hot/Cold Words, open a support ticket or contact Check Point Support.

Creating Custom DLP Rules


At times, administrators would like to create DLP Rules specific to their organization.

Regular Expression
Harmony Email & Collaboration allows you to define a custom DLP Rule based on a Regular Expression.

To add a regular expression:


1. Navigate to Threat Protection > Config > Security Engines.
2. Click Configure for DLP.
3. Under Custom regex 1, add the regular expression.

Harmony Email & Collaboration Administration Guide   |   44


Configuring Security Engines

4. Add Custom regex 1 to one of the DLP Categories so that it can be used in the DLP policy rules. For
more details, see "Configuring DLP Categories" on page 41.
5. Click Save.
Note - If you need more than one custom Regular Expression DLP rule, open a support ticket or contact
Check Point Support.

Compound DLP Rules


Compound DLP Rules are parent DLP rules that contain other child DLP rules, divided into two groups:
n Triggers – DLP rules that must match otherwise, the parent DLP rule will not match
n Children – DLP rules that could match and add to the parent DLP rule hit count.
In addition, each Compound DLP Rule has a Minimum Match Type Count of its own so that the number of
matches across all contained data types must be above it for the parent DLP Rule to match.
For example, you can create a compound DLP Rule named MyCompany Internal Documents the following
way:
1. Triggers
a. A string “MyCompany”
b. A string “Confidential”
2. Children

Harmony Email & Collaboration Administration Guide   |   45


Configuring Security Engines

a. Source Code
b. Bank Swift routing numbers
3. Minimum Match Type Count = 4
Example scenarios:

Findings

Bank
Scenario Match? Reason
“My Source SWIFT
"Confidential"
Company” Code Routing
Numbers

Only 2 3 0 0 Yes All triggers


Triggers plus match
count
above the
threshold

Some 3 0 2 2 No One of the


Triggers triggers not
matched

Not enough 1 1 1 0 No Match


matches count
below the
threshold

Triggers 1 1 2 2 Yes All triggers


and plus match
Children count
above the
threshold

Creating a Compound DLP Rule


Harmony Email & Collaboration allows you to define a custom Compound DLP Rule.

To create a compound DLP rule:


1. Navigate to Threat Protection > Config > Security Engines.
2. Click Configure for DLP.
3. Scroll down and find Patient Information below Compound Info Types.

Harmony Email & Collaboration Administration Guide   |   46


Configuring Security Engines

4. Edit the Triggers, Children, and Minimum Match Type Count.


5. Add Patient Information to one of the DLP Categories so that it can be used in the DLP policy rules.
For more details, see "Configuring DLP Categories" on page 41.
6. Click Save.
Note - If you need more than one custom Compound DLP Rule, open a support ticket or contact Check
Point Support.

Other Types of Custom DLP Rules


If you need a different custom data type, open a support ticket or contact Check Point Support.

Forensics
DLP detections are recorded as events for forensic and auditing purposes. The events include what type of
sensitive information was potentially leaked (PII, HIPAA, etc.).
You can see events from Threat Protection > Events.

Harmony Email & Collaboration Administration Guide   |   47


Configuring Security Engines

Click-Time Protection
Check Point's virtual Inline technology provides phishing protection for emails after they have been scanned
by Microsoft servers, but before they reach the user’s inbox. In most cases, a malicious URL will be blocked
before it is even seen by the user.
New attacks, however, use compromised servers that appear benign until the message has been delivered.
Click-Time Protection checks the URL when a user clicks and blocks access to the website if it is found to be
malicious.
Click-Time Protection is based on URL "rewrites". Every link within the incoming email is replaced with a
Check Point URL. When anyone clicks on the link, it tests the site before redirecting the user.
When a security gateway replaces a URL, Office 365 Advanced Threat Prevention (ATP) can not scan it
anymore. Harmony Email & Collaboration comes after the ATP, and thus can replace URLs after ATP
already scanned the email. As a result, Click-Time Protection can be enabled in addition to ATP, as an
additional layer of protection.

Benefits
n Additional layer of post-delivery protection.
n Enhanced protection from zero-day attacks, as sometimes it takes a few minutes to detect the
malicious emails.
n Forensics.
Note - Click-Time Protection is available for Office 365 email and Gmail.

Click-Time Protection Behavior


Once enabled, all links contained in an incoming email are replaced with a Check Point link.
The link presents a tool-tip with the original URL, indicating that the link is protected by Check Point.

Harmony Email & Collaboration Administration Guide   |   48


Configuring Security Engines

Note - Formatted tool tips are available on Microsoft Outlook for Mac, Outlook Web Access, and many other
clients. Some clients, such as Outlook for Windows, limit the ability to present tool tips and will present the
raw rewritten URL.
When a user clicks on the URL, Harmony Email & Collaboration checks the target URL. If it is found to be
malicious, the user is forwarded to a warning page, otherwise, it redirects to the target URL.

Note - Depending upon your company’s policy, the user may be provided a link to the malicious page.

Configuring Click-Time Protection


To configure Click-Time Protection:
1. Navigate to Threat Protection > Config > Security Engines.
2. Choose Click-Time Protection and click Configure.

Harmony Email & Collaboration Administration Guide   |   49


Configuring Security Engines

3. Select the required option for how malicious sites should be handled.
n Prevent access to the malicious URL. User has option to proceed.
n Prevent access to the malicious URL. User cannot proceed.
n Do nothing
4. Click Save.

Forensics
Each stage of the Click-Time Protection process is recorded for forensic and auditing purposes, from the
original URL substitution event to the result of the time-of-click scan.
Click-Time Protection processes the events as Malicious Url and Malicious Url Click.
Malicious Url event is recorded when a user clicks on the rewritten URL and is redirected to the warning
page. Malicious Url Click event is recorded when the user clicks Proceed anyway in the warning page.
Note - Malicious Url Click is available depending on your company’s policy.
For multiple recipients - each click would generate an event. Events are aggregated by default.

Harmony Email & Collaboration Administration Guide   |   50


Email Protection

Email Protection
When a user shares an email or file through the SaaS application, Harmony Email & Collaboration gets
notified through API. The security engine then scans the data for threats and malicious content, and
determines if it is necessary to quarantine, clean, remove, and more.
To scan the data for threats, Harmony Email & Collaboration uses a full-blown Check Point security stack.
This includes zero-day threats protection and malware prevention, data leak prevention, and the ability to
reveal shadow IT scenarios. Harmony Email & Collaboration is designed to protect from real SaaS threats.

Overview
Harmony Email & Collaboration offers the industry’s most complete cloud security solution with defense-in-
depth capabilities to make your SaaS and IaaS safe and compliant. It protects your users and files in any
cloud environment, from Office 365 to Gmail, Amazon Web Services to Azure.
Harmony Email & Collaboration offers three modes of protection for email outlined below:
1. Monitor only
2. Detect and Prevent
3. Protect (Inline)
Monitor only mode provides visibility into the cloud-hosted email leveraging publicly available API’s and a
journal entry from the SaaS email provider. Scan results are provided from 60+ best of breed security tools.
In this mode, manual and automated query based quarantines are available after delivery to the user
mailbox.

Harmony Email & Collaboration Administration Guide   |   51


Email Protection

1. Incoming email passes through email provider’s spam filter. Emails are sorted accordingly,
a. Rejected
b. Accepted, Moved to Junk
c. Accepted, Moved to Inbox
2. Manual and automated query based quarantines are available after delivery to the user mailbox.
Detect and Prevent mode provides an increased level of protection that scans email via journaling
leveraging the same SaaS email provider API’s. This mode adds an automated policy action to quarantine
malware, phishing attacks etc. based on the results of the best of breed security stack. In this mode user
notifications and release workflows are available.

1. Incoming email arrives in respective mailbox folder.


2. Harmony Email & Collaboration detects new emails and scans (10 sec - 5 min).
3. If malicious, Harmony Email & Collaboration takes automatic action, otherwise, leave the email alone.
4. Optional user notifications and release workflows are available.
Protect (Inline) mode provides the highest level of protection and scans emails prior to delivery to the end
user’s mailbox. Leveraging the same SaaS email provider API’s and implementing mail flow rules Harmony
Email & Collaboration can scan email with a best of breed security stack to protect end users from malware,
data leaks, phishing attacks and more. Scanning and quarantining takes place before email is delivered to
the user’s mailbox. This mode insures that threats are detected and remediated before the user has access
to the email.

Harmony Email & Collaboration Administration Guide   |   52


Email Protection

1. Incoming email heads to the mail flow.


2. Harmony Email & Collaboration redirects the mail for scanning (10 sec - 5 min).
3. If malicious, Harmony Email & Collaboration takes action, otherwise, returns email to the mail flow.
4. User notifications and release workflows are defined in policy.

Office 365 Mail


Overview
Microsoft offers a wide variety of SaaS solutions, each with its own infrastructure and integration protocols.
Using Harmony Email & Collaboration’s native application programming interface (API), Harmony Email &
Collaboration connects the security tools directly to Microsoft’s infrastructure and provides a full suite of
security solutions for data within enterprise Microsoft SaaS applications.

How it Works
Harmony Email & Collaboration integrates with the following Office 365 services:
n Email (Cloud Exchange),
n OneDrive (File storage and sharing),
n SharePoint (Collaboration), and
n Teams (Collaboration).

Harmony Email & Collaboration Administration Guide   |   53


Email Protection

Required Permissions
Harmony Email & Collaboration require the following permissions from Office 365.

Permissions
Required by Functions Performed by Harmony Email & Collaboration
Office 365

Read and write Used for scanning the email in Detect and Prevent mode and for manual actions after
access to user delivery of email to the user.
and shared AI/ML uses these permissions for email backward scanning and reputation building.
emails

Send email on Used to send email notifications when sending by Simple Mail Transfer Protocol
behalf of others (SMTP) is not available. This includes end-user notifications for phishing, malware,
and DLP.

Read and write Used in evaluating anomaly behavior to track compromised user accounts.
user mailbox It includes continuous monitoring of changes to the mailbox settings, email-
settings forwarding, MFA disabled status, email-delete rules, old-authentication schemes
enabled for detecting insecure configurations and account-takeover scenarios.

Read and write Used for group-based management of policies. Harmony Email & Collaboration
all groups creates groups and applies users to groups in Monitor only and Protect (Inline)
(preview) mode.

Send email as Used to send email notifications when sending by SMTP is not available. This
a user includes end-user notifications for phishing, malware and DLP.

Read and write Used for scanning the email in Detect and Prevent mode and for manual actions after
user email delivery of email to the user.
AI/ML uses these permissions for email backward scanning and reputation building.

Manage Used for Automatic mode setup. It is needed for PowerShell access to create items
Exchange As not available through API (Journal Entries/Connectors/Mail Flow Rules).
Application

Harmony Email & Collaboration Administration Guide   |   54


Email Protection

Permissions
Required by Functions Performed by Harmony Email & Collaboration
Office 365

Read and write Used in evaluating anomaly behavior to track compromised user accounts. It includes
all user mailbox continuous monitoring of changes to the mailbox settings, email-forwarding, MFA
settings disabled status, email-delete rules, old-authentication schemes enabled for detecting
insecure configurations and account-takeover scenarios.

Read and write Used by AI/ML to build social graphs and global contact lists for reputation building.
contacts in all
mailboxes

Read and write Used in evaluating anomaly behavior to track compromised user accounts.
an email in all It includes continuous monitoring of changes to the mailbox settings, email-
mailboxes forwarding, MFA disabled status, email-delete rules, old-authentication schemes
enabled for detecting insecure configurations and account-takeover scenarios.

Send email as Used to send email notifications when sending by SMTP is not available. This
any user includes end-user notifications for phishing, malware, and DLP.

Use Exchange Used to take actions in Detect and Prevent and manual mode. It includes all actions
Web Services like quarantine, move to junk, etc.
with full access
to all mailboxes

Read and write Used by the AI/ML to read users/group information for the anti-impersonation engine.
directory data It is also used to map users to created policy groups.
Uses user titles and AI to understand 'VIPs' and high-profile risks, groups,
departments for building reputation graphs.

Access Used by the AI/ML to read users/group information for the anti-impersonation engine.
directory as the It is also used to map users to created policy groups.
signed-in user Uses user titles and AI to understand 'VIPs' and high-profile risks, groups,
departments for building reputation graphs. Alt method leveraging Microsoft API.

Read and write Similar to "Read and write all groups (preview)" but uses a different Microsoft API.
all groups Used for group-based management of policies. Harmony Email & Collaboration
creates groups and applies users to groups for Monitor only and Protect (Inline)
policy modes.

Read and write Used to give our app permissions to run the PowerShell commands to create items
all directory not available through API (Journal Entries/Connectors/Mail Flow Rules). It is used
RBAC settings during the initial setup process.
Note - This privilege can be removed via PowerShell after the initial setup is
completed.

Read and write Allows Harmony Email & Collaboration to manage users with another Microsoft API.
all users' full Future Auto-remediation policies: Force MFA, Reset password, expire a session, etc.
profiles

Read activity Used by the AI/ML for getting login events, ATP events, etc.
data for your Used for login activity mapping and anomaly detections.
organization

Harmony Email & Collaboration Administration Guide   |   55


Email Protection

Permissions
Required by Functions Performed by Harmony Email & Collaboration
Office 365

Read service Reserved for future releases.


health
information of
your
organization

Activating Office 365 Mail


For details about the procedure to activate Office 365 mail, see "Activating Office 365 Mail" on page 14.

Office 365 Mail Security Settings


Quarantine Settings
For details about quarantine, see "Managing Quarantine" on page 120.

Notification Templates and Senders


The content for notifications sent to internal and external end users are controlled through the Office 365
Mail configuration page.
To configure the notification templates, navigate to Threat Protection > Config > Cloud App Store > Office
365 Mail > Configure > Advanced.
Note - Some notifications can be customized from the policy. For more details, see "Configuring a Threat
Detection Policy Rule" on page 61 and "Data Loss Prevention (DLP) Policy" on page 68 and "Click-Time
Protection Policy" on page 74.

Available configurable templates

n Quarantine notification `From`


n Quarantine notification `Reply-To`
n Quarantine notification subject
n Quarantine notification body
n Phishing quarantine notification body
n Quarantined notification (admin restore request)
n Restore request subject
n Restore request body
n Decline message subject
n Decline message body
n Threat extracted message format
n Threat extracted attachment name template
n Phishing quarantine notification subject

Harmony Email & Collaboration Administration Guide   |   56


Email Protection

n Phishing quarantine notification body (admin restore request)


n Phishing decline message subject
n Phishing decline message body
n Spam quarantine notification body
n Spam quarantine notification subject
n DLP quarantined notification body (admin restore request) - Outbound
n DLP quarantined notification body (admin can restore)
n DLP quarantined notification body (user can restore) - Outbound
n DLP restoration notification body - Outbound
n Restore notification subject
n Added header key
n Added header value
n Sender (Envelope From) to use in an alert sent to quarantine inbox
n Email to use as `Reply-To` in an alert sent to quarantine inbox
n Report Phishing approve subject
n Report Phishing approve body
n Report Phishing decline subject
n Report Phishing decline body
n Outgoing spam quarantine notification body
n Outgoing phishing quarantine notification body
n Outgoing phishing quarantine notification body (admin restore request)
n Outgoing quarantine notification body
n Outgoing quarantined notification (admin restore request)
n DLP quarantined notification body (admin restore request) - Inbound
n DLP quarantined notification body (user can restore) - Inbound
n DLP restoration notification body - Inbound
n DLP alert subject to external sender - Inbound
n DLP alert body to external sender - Inbound

Google Gmail
Overview
Google offers a lot of APIs for Gmail and Google Drive. Harmony Email & Collaboration initiates the security
by fetching all emails, attachments, files, and folders metadata in a bootstrap process. The bootstrap
ensures the customer’s dedicated virtual appliance has the same cloud state.

Harmony Email & Collaboration Administration Guide   |   57


Email Protection

How it Works
Gmail offers file sharing and file collaboration tools that allow employees and outside collaborators to share
files. Harmony Email & Collaboration adds additional layers of security, privacy, and compliance not offered
by ShareFile:
n Malware detection with Anti-Virus and Advanced Persistent Threat detection
n Data Leakage Prevention
n Revocable Encryption (for files leaving the Box environment)
n File sanitization
n User Anomaly Detection, etc.

Required Permissions for Gmail


The cloud state used for Gmail by Harmony Email & Collaboration is composed of the following entities:
n Users
n Emails
n Attachments
n Labels used in emails
Once the cloud state is saved, Harmony Email & Collaboration starts monitoring the changes for each user.
To track each change for each user in the cloud, Harmony Email & Collaboration uses the following
channels:
n Subscribe each user to Google Push Notifications for new messages
(https://developers.google.com/gmail/api/guides/push)
n Fallback to polling each user history of changes, each minute if Push Notifications fails
(https://developers.google.com/gmail/api/guides/sync)
Harmony Email & Collaboration uses the following resources for Gmail from the APIs:
n Messages
n Labels
n History of changes
n Attachments
Harmony Email & Collaboration require the following permissions from Gmail.

Permissions Required by Gmail

View and manage Emails

View users on your domain

Insert mail into your mailbox

Manage mailbox labels

View and modify but not delete your email

Harmony Email & Collaboration Administration Guide   |   58


Email Protection

Permissions Required by Gmail

View your emails messages and settings

Manage your basic mail settings

View and manage Pub/Sub topics and subscriptions

View your email address

View your basic profile info

Required Permissions for Google Drive


The cloud state for Google Drive used by Harmony Email & Collaboration is composed of the following
entities:
n Users
n Groups and Memberships
n Tokens
n Apps
n Files and Folders
n Permissions
Once the cloud state is saved, Harmony Email & Collaboration starts monitoring the changes for each user.
To track each change for each user in the cloud, Harmony Email & Collaboration uses the following
channels:
n Subscribe each user to Google Push Notifications for changes
(https://developers.google.com/drive/v3/web/push).
n Fallback to polling each user, each minute if Push Notifications fails
(https://developers.google.com/drive/v3/web/manage-changes)
n Subscribe each user to Google Reports API to get its activities related to permissions, authorization
to external apps, and tokens. ( https://developers.google.com/admin-sdk/reports/v1/get-start/getting-
started)
Harmony Email & Collaboration uses the following resources for Google Drive from the APIs:
n Files and Folders metadata (not include file contents)
n Users and Groups metadata
n Permissions
n Changes (not including the content of files changed)
n Channels
n Tokens
n Applications
Harmony Email & Collaboration require the following permissions from Google Drive.

Harmony Email & Collaboration Administration Guide   |   59


Email Protection

Activating Gmail
For details about the procedure to activate Gmail, see "Activating Google Workspace (Gmail and Google
Drive)" on page 18.

Gmail Security Settings


Quarantine Settings
For details about quarantine, see "Managing Quarantine" on page 120.

Notification Templates and Senders


The content for notifications sent to internal and external end users are controlled through the Gmail
configuration page.
To configure the notification templates, navigate to Threat Protection > Config > Cloud App Store > Gmail
> Configure > Advanced.
Note - Some notifications can be customized from the policy. For more details, see "Configuring a Threat
Detection Policy Rule" on the next page and "Data Loss Prevention (DLP) Policy" on page 68 and "Click-
Time Protection Policy" on page 74.

Available configurable templates

n Quarantine notification subject


n Quarantine notification body
n Quarantined notification (admin restore request):
n Restore request subject
n Restore request body
n Decline message subject
n Decline message body
n Threat extracted message format
n Threat extracted attachment name template
n Phishing quarantine notification subject
n Phishing quarantine notification body
n Phishing decline message subject
n Phishing decline message body
n Spam quarantine notification body
n Spam quarantine notification subject
n Report Phishing approve subject
n Report Phishing approve body
n Report Phishing decline subject
n Report Phishing decline body

Harmony Email & Collaboration Administration Guide   |   60


Email Protection

Configuring Email Policy


Threat Detection Policy
Threat Detection policy rules are designed to prevent malicious emails (phishing, spam, malware etc.) from
getting to your end-users mailbox or alternatively prevent them from being sent by your end-users to
external parties.
Detect and Prevent mode and Protect (Inline) mode offers three separate workflows to manage malware
and phishing attacks. In Detect and Prevent mode the workflow scans the emails after delivery of email to
the user and in Protect (Inline) mode, the workflow scans the emails prior to delivery to the user.

Configuring a Threat Detection Policy Rule

Step Description

1 Click Threat Protection > Policy on the left panel of the Infinity Portal.

2 Click Add a New Policy Rule.

3 From the Choose SaaS drop-down list, select the SaaS platform you want to set policy for
Office 365 Emails or Gmail.

4 From the Choose Security drop-down list, select Threat Detection and click Next.

5 Select the desired policy mode (Monitor Only, Detect and Prevent or Protect (Inline)).
If required, you can change the Rule Name.

6 Select the users and groups to which the policy is applicable and click Add to Selected.
To apply the policy to all users and groups in your organization, enable All Users and Groups.
To exclude some of the users or groups from the policy, select the users/groups and click Add
to Excluded.

Harmony Email & Collaboration Administration Guide   |   61


Email Protection

Step Description

7 Select the security tools required for the policy. You can configure the security engines from
the Cloud App Store and Security Engines under Config.
Note - If you select either Detect and Prevent or Protect (Inline) mode, you will see additional
configuration options that allow customization of the user level email notifications.

For more details, see "Phishing Protection" below.

8 You can configure Alerts to send to the configured Administrators, (Administrators can opt in
under user management) or to specified email addresses.

Notes:
n For Malware and Phishing, separate alerts are available.
n You can customize the Email alert templates by clicking on the gear icon to the right of
the alert.

9 After the policy is configured, click Save and Apply.


Note - Policies are based on the order of precedence. Make sure your policies are applied in
the proper order. You can adjust the policy order from the order column of Policy.

Phishing Protection
Phishing protection is comprised of the phishing workflows in the policy itself and from the general Anti-
Phishing engine settings.
For information about the Anti-Phishing engine settings, see "Anti-Phishing" on page 37.

Phishing Workflow

When phishing is detected in emails, the configurable workflows for Anti-Phishing are as follows:

Harmony Email & Collaboration Administration Guide   |   62


Email Protection

Workflow Description

User receives the Email to the user is scanned and when found to be suspicious the subject is
email with an alert replaced with a Phishing Alert notice and the original subject is provided in
brackets. The body of the message includes a customizable message to the user
along with a link to remove the warning if a false positive is suspected by the
user.

Email Quarantined. Email to the user is scanned and when found malicious the subject is replaced
User is alerted, with Quarantined notice and the original subject is provided in brackets. The body
allowed to request a of the message is replaced with a customizable message to the user along with a
restore. Admin must link to release the email if a false positive is suspected.
approve

Email quarantined. In this mode, the email is automatically quarantined with no user notification.
User is not alerted.
Admin can restore

Suspicious Phishing Workflow

When suspicious phishing is detected in emails, the configurable workflows for Anti-Phishing are as follows:

Workflow Description

User receives the email with a The email is delivered to the user with a notification inserted in the
warning body of the email.

User is not alerted. Admin can In this mode, the email is automatically quarantined with no user
restore notification.

Harmony Email & Collaboration Administration Guide   |   63


Email Protection

Malware Workflow
When malware is detected in emails, the configurable workflows for Anti-Malware are as follows:

Workflow Description

User is alerted and Email to the user is scanned and when found malicious the subject is replaced
allowed to restore the with a quarantined notice and the original subject is provided in brackets. The
email body of the message is replaced with a customizable message to the user
along with a link to release the file if a false positive is suspected. The
attachment is also stripped and noted in the replaced body.
In this workflow, the user has the option to release the quarantined attachment.
Using the link in the email, the user can release the attachment. The original
email and attachment will be immediately delivered back to the inbox.

Harmony Email & Collaboration Administration Guide   |   64


Email Protection

Workflow Description

User is alerted, Email to the user is scanned and when found malicious the subject is replaced
allowed to request a with a Quarantined notice and the original subject is provided in brackets. The
restore. Admin must body of the message is replaced with a customizable message to the user
approve along with a link to release the file if a false positive is suspected. The
attachment is also stripped and noted in the replaced body.
In this workflow, the Malware is zipped, password protected and delivered to
the Restore request approver. Using the link in the email, the end-user can
request to release the attachment. After the request is approved, the original
email and attachment will be immediately delivered back to the inbox.

Email removed. User In this mode, the email is automatically quarantined with no user notification.
is not alerted. Admin
can restore

Threat Extraction Workflow


SandBlast implements a multi-layer defense architecture that filters possible threats by using sophisticated
analysis, to optimize efficiency and ensure rapid response to any type of attack (including: worms,
ransomware, file-less malware, spyware, and more) without compromising network performance or security
policies.
You can choose to clean and/or convert over 70 file types such as Microsoft Office documents and
templates, EXE, DLL, Archives (ISO, ZIP, 7Z, RAR, and so on.), PDF, Flash, Java, scripts, and more.
To configure Threat Extraction for Office 365 emails

Note - Use the same steps below Google's Google Workspace emails.

Step Description

1 From the Threat Protection tree, select Policy.

Harmony Email & Collaboration Administration Guide   |   65


Email Protection

Step Description

2 Expand the Office 365 Emails Policy Rules tab, select a rule that matches these criteria:
STATUS MODE RULE NAME

STOPPED Prevent* Office 365 Emails Threat Detection

*Important - Threat Extraction for office emails works only in the Prevent Mode.

3 Expand the Advanced tab and select the Enable SandBlastThreat Extraction for
attachments checkbox.
Note - If you do not select the Enable SandBlastThreat Extraction for
attachments checkbox, then you are not be able to use the Clean or Convert
files option.

4 In the Clean drop-down box, select which file types to clean.

Note - If you select to clean All file types, you are not be able to use the Convert
drop-down menu.

5 In the Convert drop-down box, select which file types to clean.

Important - In case of overlapping file types, Clean always has the higher
priority.

Note - If you select to clean All file types, you are not be able to use the Clean
drop-down menu.

6 Depending on which detection blades and tools activated in the previous step, you can
choose from the following list of workflows.
n TEX workflow
n Malicious attachment workflow (option to edit email alerts)
n Phishing workflow (option to edit email alerts)
n Suspicious phishing workflow
n Suspicious malware workflow (Triggered for low-confidence Threat Emulation.
Every Threat Emulation result with a higher than "low" confidence triggers the
regular "Malicious Attachment Workflow).
n Spam workflow

7 On the Severity tab, select the workflow severity level.

Optional: Configure excluded IPs manually in mail flow rule

8 Click Save and Apply.

Harmony Email & Collaboration Administration Guide   |   66


Email Protection

Spam Workflow
Spam behavior is configured for Office 365 and Gmail.
1. Go to Threat Protection > Policy and select Mail Threat Detection policy for Office 365 or Gmail.
2. Make sure the policy is in Protect (Inline) mode.
3. Locate the Spam workflow, and choose one of the following automated actions:
n Email is allowed. Deliver to Junk folder (only for Office 365): The Anti-Phishing engine marks
the email as Spam by updating the Spam Confidence Level (SCL) to 9 (by setting value of
header X-CLOUD-SEC-AV-SCL to True). The email will be moved to the Spam folder by
Office 365 (with the proper Mail Flow rules), based on the configured action for SCL=9 (by
default set to deliver the message to the recipients' Junk Email folder).
For more information on SCL levels, see SCL.
n Email is allowed. Move to Spam (only for Gmail): Deliver the email to the user's Spam folder.
n Add [Spam] to subject: The email is delivered to the inbox and the subject is modified to start
with '[Spam]' (for example, the email subject 'Are you interested' will be delivered with new
subject: '[Spam] Are you interested').
n Quarantine. User is alerted and allowed to restore the email: The email is quarantined and
the user is allowed to restore the email.
n Quarantine. User is not alerted (admin can restore): The email is quarantined and the admin
can restore the email.
n Do nothing: Email is delivered to the inbox.
4. Click Save and Apply.

Notification Settings
To take actions outside of the policy, framework actions can be taken from the email profile or be set through
queries. Advanced options are available to customize all manual generated messages and notifications to
the end users. These notifications are set in the Cloud App Store under your cloud email service.
Note - Advanced options are available to customize all messages and notifications to the end users. To
customize the messages, click on the gear icon, format the required message, and click OK.

Harmony Email & Collaboration Administration Guide   |   67


Email Protection

Warning Banners

For suspicious (low confidence) email detections, the admin may choose to allow the email to be delivered
to the inbox. In such cases, Harmony Email & Collaboration allows warning the end-users of the potential
risks detected on these emails by embedding a banner that explains the nature of the risk.
Note - Warning banners are available only in Protect (Inline) and Detect and Prevent modes.
Warning banners are generated, based on the detection attributes as follows:
Suspected phishing: This email contains elements that may indicate "Phishing" intent - aimed at tricking
you to disclose private/financial information or even your credentials.
Suspected phishing - potentially trusted sender: This mail is suspected to be a phishing e-mail. Are you
sure you trust the sender (<sender>)?
First time sender: We do not know this sender, do you trust <sender>?
Non-authentic internal email: The email is sent from the organization's domain (<domain>), but suspected
as non-authentic.
Potential Impersonation: The sender <sender> seems to be using a different email address than in the
previous correspondence (<previous email>), this often indicates an impersonation attempt.
Encrypted Attachments: Be careful when opening this email. It is carrying an encrypted attachment - often
used for evading virus scans. Make sure you trust this email before opening the attachment.
To configure warning banners:

Step Description

1 Go to Threat Protection > Policy > Office 365 Mail Threat Detection.

2 Under Suspicious phishing workflow, select User receives the email with a warning.

3 To configure the banner layout, click the gear icon next to the workflow and edit the HTML
layout.

4 Click Save and Apply.

Data Loss Prevention (DLP) Policy


DLP Policy filters outgoing emails to ensure that sensitive data does not reach unauthorized recipients.
In addition, it can also filter incoming emails to ensure sensitive data is not stored in your organization's
mailboxes and/or that it is shared only through authorized delivery methods.
For more details about the DLP security engine, see "Data Loss Prevention" on page 40.

DLP Policy for Outgoing Emails

To configure DLP policy for outgoing emails:


1. Go to Threat Protection > Policy.
2. Click Add a New Policy Rule.
3. Select the desired SaaS application under Choose SaaS drop-down.

Harmony Email & Collaboration Administration Guide   |   68


Email Protection

4. Select DLP under Choose Security drop-down and click Next.


5. Select Protect (Inline) or Monitor only mode.
6. Under Scope for the policy:
a. Select Outbound Emails.
b. Select the Specific Sending Users and Groups, the policy applies to.
7. (Optional) Enable Use subject regex and enter the required DLP Subject Regex. For more details
about enabling this feature and about its enforcement, see "DLP Subject Regular Expression
(Regex)" on page 43.

8. Select the required DLP Rules.


9. Select the required DLP workflow.
Note - This option is available only in Protect (Inline) mode. See "DLP Workflows for Outgoing
Emails" below.
10. Click Save and Apply.
For more details about the DLP security engine, see "Data Loss Prevention" on page 40.

DLP Workflows for Outgoing Emails

Note - The workflows are available only in Protect (Inline) mode.


n Email is blocked. User is alerted and allowed to request a restore (admin must approve) (default)
- Detected email will not be delivered to the recipient and will be moved to quarantine mailbox. The
user will receive an email with an alert of the quarantine action, and will be able to request to restore
the original email (send the original email to the recipient).
n Email is blocked. User is alerted and allowed to restore the email - Any detected email will not be
delivered to the recipient and will be moved to quarantine mailbox; the user will receive an email with
alert of the quarantine action, and will be able to restore the original email (send the original email to
the recipient).

Harmony Email & Collaboration Administration Guide   |   69


Email Protection

n Email is blocked and user can request to resend as encrypted (admin must approve) - Detected
email will not be delivered to the recipient and will be moved to quarantine mailbox. The user will
receive an email with an alert of the quarantine action, and will be able to request to resend the email
as encrypted email.
n Email is blocked and user can resend as encrypted - Detected email will not be delivered to the
recipient and the user can resend the email as encrypted email.
n Email is allowed. Encrypted by Microsoft - Any detected email will be delivered to the recipient and
a header will be added to email. For more details, see "Office 365 Email Encryption for Outgoing
Emails" on page 73.
n Email is allowed. Header is added to the email - Any detected email will be delivered to the recipient
with additional header that is configured in the policy.
n Do nothing - Any detected email will be delivered to the recipient without any changes.

DLP Alerts for Outgoing Emails

You can configure alerts for outgoing emails detected to contain a DLP violation:
n Send notification email to specific recipients when DLP is detected. It is possible to customize email
template using the gear icon next to the action.
n Send email alert to the sender when DLP Subject Regex pattern and DLP is detected in the email
subject. For details, see "DLP Subject Regular Expression (Regex)" on page 43.
n Send email alert to the sender when DLP Subject Regex pattern is not detected but DLP is detected
in the email subject. For details, see "DLP Subject Regular Expression (Regex)" on page 43.

Outgoing Email Protection - Office 365 Footprint

Transport rules

Additional transport rule is created when enabling Inline DLP.


n Rule name: Check PointDLP Outbound
n Rule:

Harmony Email & Collaboration Administration Guide   |   70


Email Protection

n Rule description:

Harmony Email & Collaboration Administration Guide   |   71


Email Protection

Connectors

Additional connector will be added, Check Point to Office 365.

Harmony Email & Collaboration Administration Guide   |   72


Email Protection

n Connector:

Office 365 Email Encryption for Outgoing Emails

Office 365 provides the ability to encrypt the outgoing emails using Microsoft Encryption. Encryption can be
applied automatically for emails detected as sensitive by the DLP engine.
Note - The Office 365 email encryption is applicable only for outgoing emails.
For more information about the Office 365 encryption mechanism, see the Microsoft Documentation.

Required License for Encrypting Outgoing Emails

In Monitor only mode, you can use the existing license of Office 365 as the minimum requirement. However
if you want to use Microsoft Encryption as an action in policy, you must have license with Office 365
Message Encryption (OME) capabilities. For more details, see Microsoft plans with OME capabilities and
Microsoft Documentation.

Encrypting Outgoing Emails

Select the required DLP workflow that has encryption (Email is allowed. Encrypted by Microsoft or Email
is blocked and user can resend as encrypted). Based on the workflow defined, the emails are encrypted
automatically.
All outgoing emails that has data leak will be sent with a header:
n Microsoft Encryption: X-CLOUD-SEC-AV-Encrypt-Microsoft: True

DLP Policy for Incoming Emails

To configure DLP policy for incoming emails:


1. Go to Threat Protection > Policy.
2. Click Add a New Policy Rule.
3. Select the desired SaaS application under Choose SaaS drop-down.
4. Select DLP under Choose Security drop-down and click Next.
5. Select Protect (Inline) mode.
6. Under Scope for the policy:

Harmony Email & Collaboration Administration Guide   |   73


Email Protection

a. Select Inbound Emails.


Note - This option is available only in Protect (Inline) mode.
b. Select the Specific Receiving Users and Groups, the policy applies to.
7. Select the required DLP Rules.
8. Select the required DLP workflow.
9. Click Save and Apply.
For more details about configuring the DLP engine, see "Data Loss Prevention" on page 40.

DLP Workflows for Incoming Emails

n Email is blocked. User is alerted and allowed to request a restore (admin must approve) (default)
- Detected email will not be delivered to the recipient and will be moved to quarantine mailbox. The
user will receive an email with an alert of the quarantine action, and will be able to request to restore
the original email (send the original email to the recipient).
n Email is blocked. User is alerted and allowed to restore the email - Any detected email will not be
delivered to the recipient and will be moved to quarantine mailbox; the user will receive an email with
alert of the quarantine action, and will be able to restore the original email (send the original email to
the recipient).
n Do nothing - Any detected email will be delivered to the recipient without any changes.

DLP Alerts for Incoming Emails

You can configure alerts for incoming emails detected to contain a DLP violation:
n Send alert on this violation to specific mailboxes.
n Alert the external sender about the violation when the email is quarantined.

Click-Time Protection Policy


To configure Click-Time Protection policy:
1. Navigate to Threat Protection > Policy.
2. Click Add a New Policy Rule.
3. Select the desired SaaS application under Choose SaaS drop-down.
4. Select Click-Time Protection under Choose Security drop-down and click Next.
5. Choose Scope for the policy.
6. Click Save and Apply.
Note - For more details about Workflows and additional settings, see "Click-Time Protection" on page 48.

Click-Time Protection Exceptions


Click-Time Protection allows to add exceptions to domains and URLs that need to be blocked, allowed, or
ignored regardless of being malicious or not.

Harmony Email & Collaboration Administration Guide   |   74


Email Protection

To configure Click-Time Protection exceptions:


1. Navigate to Threat Protection > Config > Click-Time Protection Exceptions.
2. Click Add New Exception.
3. Under Domain, enter the required domain in the Domain pattern: domain.com format.
4. Choose the required exception type under List Name.
n Block-list - Adds the URL to the list of URLs that will always get the block page (regardless of
being malicious or not)
n Allow-list - Allows the target URL (regardless of being malicious or not)
n Ignore-list - Does not rewrite the URL.

5. Click Ok.

Harmony Email & Collaboration Administration Guide   |   75


Managing Security Events

Managing Security Events


This chapter explains about the ways to handle security events, whether they are detected/prevented
automatically or found by the administrators/end users after not being prevented.

Security Events View


The Events screen shows a detailed view of all security events in real-time.

Filters
There are a number of filtering options.
Various filters are available on security events including a free text search.

Security
Description
Event Filter

Date Specify the timeframe of security events you want to filter for.
Options include: Last 60 min, Last 24 hours, Last 7 days, Last 30 days, and Last 12
months.

State Select to view security events that are in state New, Remediated, Dismissed, and/or
have exceptions.
In the Monitor only mode, the state is always New.
Remediated events are not seen in the Monitor only mode.

Type Select to view security events of these security types: DLP, Malware, Phishing,
Anomaly, Suspicious, Shadow IT, Alert, and Spam.

Security Level Select to view all security events of these security levels: All, Critical, High, Medium,
Low, and/or Lowest.

SaaS All activated cloud applications.

Event Events description section, identifies which file or email was found to be malicious and
Description for what reason.

Note - Threat Emulation and Anti-Virus events, originating from the same file emulation,
are grouped in the same event window. This enables Administrators to take combined
action on group events.

Harmony Email & Collaboration Administration Guide   |   76


Analytics Dashboard

Analytics Dashboard
Harmony Email & Collaboration's Analytics examines the scanned data and presents it in the form of useful
information for your analysis and necessary remedial actions.

Analytics is supported for these SaaS applications:


n Office 365 Mail
n Office 365 OneDrive
n Office 365 SharePoint
n Gmail
n Citrix ShareFile
n Microsoft Teams
n Google Drive
n Slack
n Box

Viewing Analytics
1. Click Threat Protection > Analytics > Analytics.
2. Select the SaaS application.
3. Select the period to view the analytics.
n Last 24h
n Last 7 days
n Last 30 days

Harmony Email & Collaboration Administration Guide   |   77


Analytics Dashboard

Office 365 Email and Gmail


Overview of the activities in Office 365 Email and Gmail

Analytics Sub-category Actions

Attack Detections by Type 1. Click on an attack type or


Detections The number of attacks detected per type. action.
The Analytics Events page
shows the list of security
events.
2. To export the list in a CSV
file format, click Export to
Weekly Attack Category CSV.
Weekly data of the number of attacks per 3. Click on a security event to
type. view its Email Entity page.

Action by Check Point

My User Top Attacked Users None


List of top attacked users.

Top Attacked Departments


List of top attacked departments.

Harmony Email & Collaboration Administration Guide   |   78


Analytics Dashboard

Analytics Sub-category Actions

Built In Microsoft Detection By SCL Level None


Security The number of detections by Microsoft with
(Does not Spam Confidence Level (SCL).
apply to
Gmail)

Weekly Microsoft detection efficiency


(Malware +Phishing)
Weekly data of the number of detections by
Microsoft with SCL.

Office 365 OneDrive


This screen shows an overview of the activity in Office 365 OneDrive

Widget Description

All Files The total number of files in your Office 365 OneDrive.

Incoming Files The number of files received.

Outgoing Files The number of files shared with people outside the company

System Users The number of users that can access your cloud application (not
suspended or deleted).

All Folders The number of directories in your Office 365 OneDrive.

Incoming Folders The number of folders created by an external user and shared with an
internal user.

Outgoing Folders The number of folders created internally and shared with external users.

Applications Number of application detected that have access to the service.

Security Scan Panel The number of files flagged as malicious.

Users with full access to All users who have view access to files.
files

Users with view access All users who have view access only.
to files

Harmony Email & Collaboration Administration Guide   |   79


Analytics Dashboard

Google Drive
This screen shows an overview of the activity in Google Drive

Widget Description

All Files The total number of files in your Google Drive.

Incoming Files The number of files received.

Outgoing Files The number of files shared with external users or publicly.

System Users The number of users that can access your cloud application (not suspended or
deleted).

All Folders The number of directories in your Google Drive.

Incoming Folders The number of external directories received.

Outgoing Folders The number of internal directories sent.

Recent Files The number of incoming and outgoing files within the past 24 hours.

Security Scan The number of files found to be malicious.


Panel

Live event log Detailed list of events in real time.

Shadow IT
Shadow IT is hardware or software within an enterprise that is not supported by the organization's central IT
department.
This implies that the organization has not explicitly approved the technology, or it does not know that
employees are using it.

Check Point's Approach to Shadow IT in Harmony Email & Collaboration

Based on email analysis (Office 365 and/or Gmail), Harmony Email & Collaboration gives you a direct line of
sight into cloud applications in use at your company.
Harmony Email & Collaborationidentifies emails from cloud applications to users that suggest they have
been using a cloud application. For example, emails containing messages such as "Thank you for
registering" or "You have a notification" suggest that a user has been using a cloud application. When such
an email is found in a user's mailbox, a security event is created with the type of Shadow IT.
Harmony Email & Collaboration inspects all licensed users' emails for Shadow IT.

Shadow IT Dashboard and Events

Shadow IT events are listed under Threat Protection > Events. SaaS usage can then be visualized in the
Shadow IT dashboard visible under Threat Protection > Analytics > Shadow IT.

Harmony Email & Collaboration Administration Guide   |   80


Analytics Dashboard

Shadow IT panel and description:

Panel Description

Top Used Services Most popular SaaS applications discovered.

Usage Over Time SaaS applications usage pattern over time.

Applications by Risk A breakdown of apps per risk-score. The application risk is given by the
Check Point app wiki:

Applications by The categories of apps that are used.


Category

Latest SaaS Usage The most recent discovered events of app usage.

Shadow IT classifies the severity of events using the following terms:

Panel Description

Low Events found during historical scan.

Medium First event for a user.

High Second or more event for the same user.

The following actions can be done on Shadow IT Events:

Panel Description

Dismiss Changes the event state to DISMISSED. The event will be removed from the Shadow
IT dashboard.

Approve This will add the cloud application to Allow-List. Future occurrences of emails from this
this app specific application to any user will not trigger an event. However, this will not update
past events. Consequently, this will not impact the Shadow IT dashboard that will show
past usage of the application.

Summary Report
The Summary Report provides general and security statistics for each activated SaaS application.

Reviewing Phishing Events


Events related to Phishing can be triggered by two security tools - URL Reputation and Anti-Phishing . To
review the event details, click the words Phishing or Malicious link in the event description.
This will open a screen with several sections:

Harmony Email & Collaboration Administration Guide   |   81


Analytics Dashboard

Section Description

Email Profile General information about the email such as Sender, Recipient, Subject line and
more.
For more options, such as showing the headers or the body of the raw email:
1. Click the gear icon in the top right corner.
2. Select Advanced.

Note - These options, when used, are recorded in the system audit log.

Security Stack Provides a list of the security tools that scanned the email and the results.
More details can be obtained by clicking on the exclamation mark (in case the
conclusion is that the email is malicious).

Email If the email has attachments, they will be listed in this section.
Attachments Click on an attachment's name to see more details about the security scans
performed on the file.

Conversation If the email is part of an email thread, shows related emails in the thread.

Live Event Log Shows timeline of the security scans.

When you review a phishing event, you can perform these actions:
n Quarantine the email if you determine it is really phishing, and you are not operating in a mode taking
automatic remediation. For an email already in quarantine, you can release it - if it was a false
positive.
n For Anti-Phishing:
l Report a misclassification.
l Set an exception on the sender's email address, IP domain or nickname.
The exceptions you set appear in the Config tab under Anti-Phishing Exceptions.
n Click the gear icon (in the top right corner of the Security Stack) to download the email. The download
(as an EML file) is recorded in the Audit log.

Reviewing Malware Events


Malware events can be triggered by two security tools - Anti-Virus and Threat Emulation. To review the
event details, click the name of the security tool (Check Point Anti-Virus or Check Point SandBlast) in the
event description. This opens a screen with several sections.

Harmony Email & Collaboration Administration Guide   |   82


Analytics Dashboard

If the malware was found in an email attachment:

Section Description

Email Profile General information about the email such as Sender, Recipient, Subject line and
more.
For more options, such as showing headers or the body of the raw email:
1. Click the gear icon in the top right corner.
2. Select Advanced.

Note - These options, when used, are recorded in the system audit log.

Security Stack Provides a list of the security tools that scanned the email and the results.
More details can be obtained by clicking on the exclamation mark (in case the
conclusion is that the email is malicious).

Email If the email has attachments, they will be listed in this section.
Attachments Click on an attachment's name to see more detail about the security scans
performed on the file.

Conversation If the email is part of an email thread, shows related emails in the thread.

Live Event Log Shows timeline of the security scans.

If the malware was found in a file sharing app, or after clicking on the name of a malicious email:

Type Description

File info General information about the file.


To access the file metadata and advanced options, click the icons in top corner of that
section.

Security Stack Provides a list of the security tools that scanned the file and the results.
More details can be obtained by clicking on the exclamation mark (in case the
conclusion is that the file is malicious).
For Threat Emulation, to open the emulation report in another tab, click View Report.

Permissions Users allowed to access the file.

Live Event Log Shows timeline of the security scans.

File Access Map showing the locations from where the file was accessed.
Map (In Google Drive only.)

Harmony Email & Collaboration Administration Guide   |   83


Analytics Dashboard

When you review a malware event, you can perform different actions:
n Quarantine the email/file if you determine it is indeed malicious, and you are not operating in a mode
that takes automatic remediation.
For an email or a file already in quarantine, you can release it if it was a false positive.
n For Anti-Virus and Threat Emulation:
l Report as not malicious: creates an exception on the file that appears in the Config tab under
Security Tools Exceptions.
l Submit for analysis

Click the gear icon (in the top right corner of the Security Stack) to work with the file:
n Download the file- The download is recorded in the Audit log.
n Search this MD5 on Virus Total - A quick link to the Virus Total website, searching for the file by
MD5.
n Search this SHA1 on Virus Total - A quick link to the Virus Total website, searching for the file by
SHA1.
n Search this SHA256 on Virus Total - A quick link to the Virus Total website, searching for the file by
SHA256.

Harmony Email & Collaboration Administration Guide   |   84


Office 365 Email - User Reported Phishing

Office 365 Email - User Reported Phishing


Email users are key in fighting against phishing. Users can help to detect missed attacks, and let the
security admins to block the detected attacks and helps to prevent similar attacks in the future. Microsoft
offers a built-in Mark as Phishing option in Outlook. When clicking on the option Microsoft gets notified on
the suspected missed phishing.
Harmony Email & Collaboration integrates into this 'missed phishing' mechanism, presents the reports in the
portal, and allow the admins to investigate and take actions as needed. When enabled, Anti-Phishing
captures emails sent to phish@office365.microsoft.com. This is the default behavior when phishing is
reported on both the web and desktop clients.

Benefits
n Present potentially missed attacks in the Infinity Portal.
n Integrated solution for the security admins to investigate and take actions.
n Simple, powerful way to increase end-users involvement and interact with them.

Enabling User Reported Phishing in Infinity Portal


To enable user reported phishing:
1. Go to Threat Protection > User Interaction > Configuration.
Find the Import Office 365 emails reported by users. Select which type of event to generate - Alert or
Phishing.
2. Under Phishing Reports, choose the type of event to generate - Alert, Phishing, or do nothing.

3. To keep the reported emails in a dedicated mailbox, choose the desired folder under Phishing
reporting mailbox.
4. Click Save and Apply.

Enabling Email as Phishing Option in Outlook


The ability to report an email as phishing is enabled by default in Outlook.
Office 365 administrators can add the Report Message add-in to their users’ desktop clients if it is not
already enabled. In order to do so, refer to Microsoft documentation.

Harmony Email & Collaboration Administration Guide   |   85


Office 365 Email - User Reported Phishing

Reporting Email as Phishing from Outlook


Web Client
In the web client, open the email and select Report as phishing.

Desktop Client
In the desktop client, go to Home tab, click Junk and select Report as Phishing.

Harmony Email & Collaboration Administration Guide   |   86


Office 365 Email - User Reported Phishing

User Reported Phishing Screen


The user reported phishing screen allows to view the phishing reports made by the end users. Whenever a
user marks an email as a suspected phishing, a new entry is created in the screen, and the administrator
can review it and perform the relevant actions.

Harmony Email & Collaboration Administration Guide   |   87


Office 365 Email - User Reported Phishing

To see the user reported phishing emails, go to Threat Protection > User Interaction > User Reported
Phishing.

Available Actions
1. Quarantine - Move the reported email to quarantine.
2. Decline - Ignore the report. The corresponding event is also dismissed.
Note - Dismissing the event does not dismiss the corresponding entry in the reported phishing
screen.
3. Create Block-List rule - Creates a Block-List rule to block similar attacks in future. Emails matching
the criteria can be quarantined as well.
4. Create Allow-List rule - Creates a Allow-List rule to allow similar emails that are triggered because of
false positives.

Harmony Email & Collaboration Administration Guide   |   88


Viewing All Emails / Files / Messages

Viewing All Emails / Files / Messages


Mail Explorer
Mail Explorer is used to search emails that match specific criteria.
To illustrate, you can search emails from a specific date and time to a specific date and time.
In addition, you can select to include the sender's name, IP address, and Domain.

Note - Only non-remediated emails appear in the Mail Explorer.

To use Mail Explorer:

Step Description

1 From the Threat Protection tree, select Mail Explorer.


The Mail Explorer window opens.

2 Select a email service, such as Office 365 Mail.

3 Enter the necessary information in the From and To tabs.


Optional - To apply Quarantine or Block-List rules to specific emails, select Quarantine or
Block-List.

4 Click Search.

Harmony Email & Collaboration Administration Guide   |   89


Custom Queries

Custom Queries
Harmony Email & Collaboration stores the metadata of all items (emails, files, user logins, etc.) obtained
through the public APIs of the cloud applications you are protecting and inspected by the system.
For items found to be harmless, metadata is retained for two weeks.
For malicious items, the data is stored indefinitely.
Custom Queries give you direct access to this database of metadata.
Use Custom Queries to:
n Troubleshoot
n Build custom reports
n Perform bulk action such as quarantining phishing emails

Creating and Saving a New Query


You can create and save custom queries to analyze a specific SaaS for immediate and future use.
To create and save a new query

Step Description

1 From the Threat Protection tree, click Analytics > Custom queries.

2 Click Add new query.


A list of available templates for each protected cloud app is displayed.

3 Select a template.
A Filter by box allows you to search through the templates.

4 After you select a template, then a query with predefined conditions and columns is
displayed.
You can edit the Conditions and Columns to fit your needs. See the section below.

5 If you want to save the query for future use, click Query, and then click Save As.

Editing the Query's Columns and Conditions


After you have selected a template, use the options in Custom queries to edit the template for your specific
needs.
You can edit the template's predefined columns by choosing to add, remove or rename columns.
In addition, you can set conditions on columns.

Harmony Email & Collaboration Administration Guide   |   90


Custom Queries

To add a column

Step Description

1 In Custom queries, click Columns.


A drop-down list opens.

2 Click on a column to select it, and then click Apply.

Note - Certain columns are marked with an arrow. Click on the arrow to see more
options.

To remove a column

Step Description

1 Click the column's name.


A condition box opens.

2 Select Remove column.


The column is removed.

To edit a column's name

Step Description

1 Click on the column's name.


A condition box opens.

2 Select Rename column.


The Rename column box opens.

3 In Column name, delete the column's current name, and then enter a new name.

4 Click OK.

To sort a column

Step Description

1 Click the columns name.


A condition box opens.

2 In the Sort field, choose either Sort ascending or Sort descending.

Note - If the query returns more than 1,000 results, then


sorting is not available.

Harmony Email & Collaboration Administration Guide   |   91


Custom Queries

To add a condition to a column

Step Description

1 Click the column's name.


An editing box opens.

2 In the condition box, set the condition's parameters.


Note - You can add more than one condition to a column.
To add another condition to the same column click Add
condition.

3 Click OK.
After adding a condition, it appears next to the Add condition button.

You can also add conditions without the need to display the corresponding column. In the section above
the query's result table, click Add Condition, and then select from the list of available fields.

Note - By default, all conditions are evaluated with an AND relationship when
returning the query's results. For more advanced conditions, click on the gear icon (in
the top right corner), and then select Edit conditions.

Bulk Actions on Query Results


Click on Manual actions to see options for bulk remediation: quarantine, move to junk or add phishing alert.
If no items in the query's results are selected, the action will be taken on all items. You can select only some
items before choosing a manual action to apply that action on those items only.
Additionally, the Send email report option sends an email alert to your email for each item selected in the
query's result. A pop-up enables you to configure the template before sending alerts.

Exporting a Query's Results


In Custom queries, you have an option to export the query's results to your email.
This sends an email to your email address with the query's results attached as a *.csv document.
You can schedule an export of the query's results.
To export a query's results to your email

Step Description

1 Run the query.

2 Ensure that the query is saved.

3 Click Query, and then choose Export as CSV.

Harmony Email & Collaboration Administration Guide   |   92


Custom Queries

Scheduled reports based on Custom Query results


To schedule a query's result export

Step Description

1 Run the query.

2 Ensure that the query is saved.

3 Click Query, and then choose Scheduled Report.


Note - Choose the email address to
have the query sent to, the frequency
(daily/weekly/monthly) and the exact
day and time. Double-click the report to
open it.

Using a Query as a Detect and Prevent Policy Rule


Sometimes you may want to create an action (such as quarantine) that will apply to future events matching
the query's conditions. In such a case, you can use your query as a policy rule in the Detect and Prevent
mode.

Note - No action will be taken on the current results of the query, only future results will
be impacted.

These are the available options:


n Use the query as a Detect and Prevent Rule

Step Description

1 In Custom queries, create a new query or open an already save one.

2 Click Query > Query actions > Add action.

3 Choose an action, such as quarantine, in the list of available actions.

4 In the pop-up window that opens, you can choose to edit the name of the action, and
then click OK.
Afterward, the action should appear in the menu under Query actions.
Note - Actions linked to queries are automatically taken from that point
forward in the Detect and Prevent mode. However, policy rules keep
priority over custom queries.

n Start the workflow from the Policy screen

Step Description

1 Click Add a New Policy Rule.

Harmony Email & Collaboration Administration Guide   |   93


Custom Queries

Step Description

2 Choose the SaaS application for which you want to create the rule.

3 Under Security, choose Custom Query, then click Next.

4 You are redirected to Custom Queries with a list of your saved queries (if any) and
available templates for the SaaS application that you selected.

5 Select the query that you want to work with, if needed edit the conditions, and then
click Save as.

6 The system will prompt you to choose an action before you can save the query.

Manually Sending Items to Quarantine


Single Item Quarantine
You can quarantine emails via two workflows from the Infinity Portal.

Harmony Email & Collaboration Administration Guide   |   94


Custom Queries

1. Using the event workflow


2. From the email profile

When an email is quarantined, it is removed from the user mailbox and moved to the designated quarantine
mailbox. This effectively removes access to the email by the user. Once an email is quarantined, it can be
managed using the Quarantine workflow or from the Infinity Portal for investigations and if needed the email
can be released back to the user.

Harmony Email & Collaboration Administration Guide   |   95


Custom Queries

Note - By default, the notifications for manual action is set as no notification to the user.
When implementing notifications to end-users an optional admin approval release workflow can be
delivered to the user. In this configuration admins will be notified of pending requests in the quarantine work
flow.

Bulk Manual Quarantine Process


The manual quarantine process can also be initiated in bulk via multi-select in the event workflow.

Query based Quarantine Process


For performing quarantine in bulk, the custom query engine gives you a robust search capability. Once your
search criteria are established, manual actions can be executed on the search results. For more details
about how to build custom queries, refer to "Custom Queries" on page 90.

Harmony Email & Collaboration Administration Guide   |   96


Audit Trail

Audit Trail
System Logs
All actions are reported to the system logs under Audit.

SIEM Integration
Harmony Email & Collaboration allows to integrate with multiple Security Information and Event
Management (SIEM) platforms.
Encryption - Unless configured otherwise, all events are forwarded over HTTPS.

Source IP Address
Harmony Email & Collaboration can be deployed in one of several geographic regions. The security events
get forwarded from a unique static IP for each region.
The static IP address for different regions:
n United States - 34.192.247.192
n Europe - 54.247.106.52
n Australia - 52.63.125.59

Configuring SIEM Integration


To configure SIEM integration from the Infinity Portal:
1. Go to Threat Protection > Config > Security Engines > SIEM Integration.
2. Under SIEM Integration click Configure.
3. Select the required Transport method and enter the relevant details. For more details, see "Required
fields for the Transport method" on the next page.
4. Select the required log Format.
n JSON (Splunk HEC/CIM compatible)
n JSON

Harmony Email & Collaboration Administration Guide   |   97


Audit Trail

n JSON Flat (dot notation)


n JSON (Rapid7, <8k characters)
5. Click Save.

Note - After configuring SIEM integration from the Infinity Portal, Harmony Email & Collaboration
starts sending logs. You have to configure your SIEM platform to receive Harmony Email & Collaboration
logs.
Required fields for the Transport method

Transport Method Required Fields

Splunk HTTP Event HTTP Event Collector Host


Collector (HEC)
HTTP Event Collector Token

(Optional) To use Indexer acknowledgment, click the checkbox and


enter the Channel ID

(Optional) To use Splunk Index, click the checkbox and enter the
Splunk index name

HTTP Collector HTTP Collector URL (HTTP/HTTPS)


For example, https://myconnector.mycompany.com

AWS S3 AWS IAM Role ARN

AWS S3 Bucket Name

AWS S3 Bucket Region

AWS S3 Bucket Directory Path

(Optional) To use External ID, click the checkbox and enter the
External ID.

AWS SQS AWS SQS Queue URL

Azure Log Workspace Azure Log Workspace ID

Azure Log Workspace Shared Key

Configuring AWS S3 to Receive Harmony Email &


Collaboration Logs
1. Go to AWS IAM: https://console.aws.amazon.com/iam/home#/home.
2. Create a new user.

Harmony Email & Collaboration Administration Guide   |   98


Audit Trail

To create a new user:

a. Click on Users > Add user.

b. Select a user name, enable Access Type as Programmatic access and click Next:
Permissions.

Harmony Email & Collaboration Administration Guide   |   99


Audit Trail

c. Click Create Group or select the group if already created.

d. Click Create policy or select the policy if already created.

Harmony Email & Collaboration Administration Guide   |   100


Audit Trail

e. On the new tab, click JSON and copy this over.

{
  "Version": "2012-10-17",
  "Statement": [
{
      "Effect": "Allow",
      "Action": [
        "s3:ListBucket"
      ],
      "Resource": [ 
        "arn:aws:s3:::YOUR_S3_BUCKET"
      ] 
    },
{
      "Effect": "Allow",
      "Action": [
        "s3:GetObject", 
        "s3:GetObjectAcl", 
        "s3:PutObject"
      ], 
      "Resource": [
        "arn:aws:s3:::YOUR_S3_BUCKET/THE_LOG_FOLDER_IF_ANY/*" 
      ]
    } 
  ]
}

f. Click on Review Policy and select the policy you just created.
g. Give a name to the policy and click Create policy.

h. After the policy is created, go back to the previous tab and click Refresh.

Harmony Email & Collaboration Administration Guide   |   101


Audit Trail

i. On the next screen, select a policy name and click Create Policy.

j. Go back to the Add user screen and confirm that the group you created is selected and then
click Next: Tags.

k. Add the necessary Tags (in accordance with your environment directives) and click Next:
Review.

Harmony Email & Collaboration Administration Guide   |   102


Audit Trail

l. Confirm all the configurations and click Create user.

Note - Download the CSV file or copy the Access Key and Secret access key to a safe
location. This information won’t be available again.
m. Click Close.

3. Click Roles > Create role.


4. Select Another AWS Account.
5. Insert the 12 digit number of the user created in Step 2 and click Next: Permissions.

Harmony Email & Collaboration Administration Guide   |   103


Audit Trail

Note - To find the 12 digit number, open the user on another screen.

6. Select the policy created and click Next: Tags.

Harmony Email & Collaboration Administration Guide   |   104


Audit Trail

7. Add the necessary Tags (in accordance with your environment directives), select a role name and
click Create Role.

8. Search for the role you created and click on its name.

9. Select Trust relationships and click Edit trust relationship.

Harmony Email & Collaboration Administration Guide   |   105


Audit Trail

10. Copy the following JSON code and click Update Trust Policy.

{
  "Version": "2012-10-17",
  "Statement": [
{
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::731485868276:user/checkpoint-s3-log-uploader"
      },
      "Action": "sts:AssumeRole",
      "Condition": {
        "StringEquals": {
          "sts:ExternalId": "checkpoint-s3-logs"
        }
      }
    }
  ]
}

11. Copy the Role ARN.

Harmony Email & Collaboration Administration Guide   |   106


Audit Trail

Note - This Role ARN is used while configuring SIEM Integration in the Harmony Email &
Collaboration.
12. Log in to Harmony Email & Collaboration and complete SIEM integration. For more details, see
"Configuring SIEM Integration" on page 97
Note - After this integration, Harmony Email & Collaboration starts sending the logs to the AWS S3
bucket. You have to configure your SIEM platform to receive logs from the AWS S3 bucket.

Configuring AWS S3 to Send Harmony Email &


Collaboration Logs to Splunk
1. Go to AWS IAM: https://console.aws.amazon.com/iam/home#/home.
Note - To limit Harmony Email & Collaboration’s access to your AWS S3 bucket, you have to create a
new user, group, policy, and role to use.
2. Create a new user.
To create a new user:

a. Click Users > Add User.

Harmony Email & Collaboration Administration Guide   |   107


Audit Trail

b. Select a name, enable Programmatic access, and click Next: Permissions.

c. Click Create group or select the group if already created.

Harmony Email & Collaboration Administration Guide   |   108


Audit Trail

d. On the new tab, click JSON and copy this over.

{
  "Version": "2012-10-17",
  "Statement": [
{
      "Effect": "Allow",
      "Action": [
        "s3:ListBucket",
        "s3:GetObject",
        "s3:ListAllMyBuckets",
        "s3:GetBucketLocation",
        "kms:Decrypt"
      ],
      "Resource": "*"
    }
  ]
}

e. Click Review Policy, select the policy name and click Create Policy.

f. Go back to the previous tab and click Refresh.

Harmony Email & Collaboration Administration Guide   |   109


Audit Trail

g. Select the policy created, give a group name and click Create group.

h. Go back to the Add user screen, confirm that the group you just created is selected and
click Next: Tags.

i. Add the necessary Tags (in accordance with your environment directives) and click Next:
Review.

Harmony Email & Collaboration Administration Guide   |   110


Audit Trail

j. Confirm all the configurations and click Create user.

Note - Download the CSV file or copy the Access Key and Secret access key to a safe
location. This information won’t be available again.
k. Click Close.

3. Click Roles > Create Role.


4. Select Another AWS Account.
5. Insert the 12 digit number of your account and click Next: Permissions.

Harmony Email & Collaboration Administration Guide   |   111


Audit Trail

Note - To find the 12 digit number, open the user on another screen.

Harmony Email & Collaboration Administration Guide   |   112


Audit Trail

6. Select the policy created, and click Next: Tags.

Harmony Email & Collaboration Administration Guide   |   113


Audit Trail

7. Add the necessary Tags (in accordance with your environment directives) and click on Next: Review.
8. Select a role name and click Create Role.

Harmony Email & Collaboration Administration Guide   |   114


Audit Trail

9. Search for the role you created and click on its name.

10. Copy the Role ARN.

Harmony Email & Collaboration Administration Guide   |   115


Audit Trail

11. Open Splunk and install the Splunk Add-on for Amazon Web Services, if not already installed.

12. Open Splunk Add-on for AWS.

13. Click Configuration > Account > Add and enter the Key ID and Secret Key generated when the user
was created and click Add.

Harmony Email & Collaboration Administration Guide   |   116


Audit Trail

14. Click IAM Role > Add and enter the Role ARN.

15. Click Inputs > Create New Input > Custom Data Type > Generic S3.

16. Select a name for the Input, the AWS Account and the Assume Role you configured above, the S3
Bucket Harmony Email & Collaboration is uploading the logs, a start datetime (ideally, a few minutes
before you enabled Splunk on Harmony Email & Collaboration).
17. Under Advanced Settings, set the Polling Interval to 900 s (15 minutes) as Harmony Email &
Collaboration uploads the logs every 15 minutes.
Note - By default, Harmony Email & Collaboration uploads the logs even before the polling interval
when they reach 5 MB.
18. Click Save.

Harmony Email & Collaboration Administration Guide   |   117


Audit Trail

Now, Splunk reads the logs from the S3 bucket while Harmony Email & Collaboration uploads them to
the S3 bucket.

Recommended Configuration for known SIEM Platforms


SIEM
Transport Method Log Format
Platform

Splunk Splunk HTTP Event Collector (HEC) JSON (Splunk


HEC/CIM
n HTTP Event Collector Host - value from Splunk HEC
compatible)
configuration
n HTTP Event Collector Token - value from Splunk HEC
configuration

Rapid7 AWS SQS JSON


(Rapid7, <8k
n AWS SQS Queue URL - Contact Check Point Support to get characters)
this value

Sumo Logic HTTP Collector JSON


n HTTP Collector URL (HTTP/HTTPS) - value from Sumo Logic
For example, https://myconnector.mycompany.com

Azure Log Azure Log Workspace JSON


Workspace
n Azure Log Workspace ID - value from Azure configuration
n Azure Log Workspace Shared Key - value from Azure
configuration

Harmony Email & Collaboration Administration Guide   |   118


Audit Trail

SIEM
Transport Method Log Format
Platform

LogRhythm AWS S3 JSON


For the fields required for AWS S3, see "Required fields for the
Transport method" on page 98.
If a new S3 Bucket is needed, you should follow specific instructions
while configuring the S3 bucket. For more details, see "Configuring
AWS S3 to Receive Harmony Email & Collaboration Logs" on
page 98.

McAfee SIEM AWS S3 JSON


For the fields required for AWS S3, see "Required fields for the
Transport method" on page 98.
If a new S3 Bucket is needed, you should follow specific instructions
while configuring the S3 bucket. For more details, see "Configuring
AWS S3 to Receive Harmony Email & Collaboration Logs" on
page 98.
To receive the logs from S3 bucket to McAfee SIEM, refer to
Configuration of Amazon S3 upload feature and McAfee
Documentation.

Harmony Email & Collaboration Administration Guide   |   119


Managing Quarantine

Managing Quarantine
Harmony Email & Collaboration quarantines emails, files and messages based on the security policies and
the settings of the different engines.
In addition, using Threat Extraction, email attachments are modified and their original copy is kept in the
solution’s quarantine.
According to the policy, end users may be able to submit restore request both for quarantined emails and
extracted (cleaned) attachments. Administrators then need to decide whether to approve restore requests
or not.

Quarantined Items
Under User Interaction > Quarantined Items, you will find all the quarantined items per protected
application.
From this view you will also be able to:
n Filter through the quarantined items
n Drill down to relevant quarantined items for more information
n Release (restore) items from quarantine
Use the application selector at the top of the page to select the quarantine list you wish to review.

Threat Extracted Emails


Under User Interaction > Threat Extracted Emails, you can see original email attachments (before
extraction).
Use this tab to manually restore emails with their original attachments to their recipients.

End-User Daily Quarantine Digest


Daily Quarantine Digest allows you to send a daily email report to end-users about quarantined and
junk/spam emails. The end-users get detailed email report that has information about the emails sent to
them and quarantined in the last 24 hours.

Harmony Email & Collaboration Administration Guide   |   120


Managing Quarantine

Global and targeted attacks can generate multiple phishing emails per day, and each one results in a
quarantine notification email from Harmony Email & Collaboration based on the policy defined by the
administrator. When the administrator activates the Daily Quarantine Digest, the user receives a single,
aggregated email report per day for the quarantined emails.
In addition, the Daily Quarantine Digest includes emails that were sent to the Junk folder, so the user can
find any misclassified emails.
The report includes:
n Quarantined emails - Emails quarantined by Harmony Email & Collaboration based on the policy
workflow. Each quarantined email has an associated user action:
l Request to release – Sends a notification to the Admin to release the email. After the Admin
approves, the email is delivered to the inbox. For more details, see "Managing Restore
Requests" on the next page.
l Release – Delivers the email to the inbox immediately.
n Junk emails - Emails that were identified as junk/spam by Anti-Phishing engine or Microsoft Office
365 (Spam Confidence Level (SCL) >= 5). By default, these emails are sent to the Junk folder. Users
must review and move relevant emails to inbox.
Notes:
n The report does not include quarantined emails that do not allow user action.
n If there are no events happened in the last 24 hours, the user will not receive the daily quarantine
digest email.

Configuring Daily Quarantine Digest


1. Log in to the Infinity Portal.
2. Navigate to Threat Protection > User Interaction > Configuration.
3. Scroll down to the Daily Quarantine Report to End User section.
4. Enable End-User daily aggregated email report.
5. (Optional) If you do not want to send an email notification immediately for each quarantined email,
enable Do not send immediate quarantine notification email.

Harmony Email & Collaboration Administration Guide   |   121


Managing Quarantine

6. Select the daily quarantine digest recipients:


n To send the daily quarantine digest to all users, select All Users.
n To send the daily quarantine digest to specific users, select Select Users, and then do these
steps.
a. In the Specific Users and Groups list, select the users or groups.
b. Click Add to Selected.
The selected users and groups are displayed in the Selected list.
7. Click Save and Apply.

Managing Restore Requests


Quarantine Restore Requests
Under User Interaction > Restore Requests you can find the requests from users to restore an item from
quarantine.
You may review the items the users asked to restore by clicking on the subject line, sender and recipient
links, as well as reviewing the restore request.

Harmony Email & Collaboration Administration Guide   |   122


Managing Quarantine

End-User Quarantine Release Process


Using the link in the email end-users can request to release the quarantined email or attachment if a false
positive is suspected.
To request for restore from quarantine:

Step Description

1 Click on the link in the email you received.

2 Enter the reason for release of email from quarantine and click Submit.

You will receive notification that the request is sent to the admin.

3 If the request is approved by the administrator the original message will be delivered.

Admin Quarantine Release Process


When the end-user requests to release an email, the administrator is notified via email to the configured
Restore requests approver email address. The email contains the Malware in a zipped, password
protected attachment with a direct link to the email profile in the Infinity Portal. The administrator can do a full
security review of the Malware from the Infinity Portal and can restore the email or decline the release
request.

Harmony Email & Collaboration Administration Guide   |   123


Managing Quarantine

Extracted Restore Requests


Using this tab you can see all users' requests currently pending to restore original email attachments.

Note - For emails in Office 365 that are quarantined, the senders flagged with a red icon
are external users.

Dedicated Quarantine Mailbox / Folder


If you would like to store quarantined emails/files locally, you can configure a dedicated quarantine
repository for every protected application. This repository is used to store every email / attachment / file that
is quarantined automatically according to the policy or manually by administrators.
Specifying such a mailbox/folder is not mandatory, as Harmony Email & Collaboration stores a copy of
quarantined items in an S3 bucket associated with the Infinity Portal.

Office 365 Mail


Note - The dedicated quarantine mailbox must be a full licensed mailbox and it cannot be a shared mailbox.

Harmony Email & Collaboration Administration Guide   |   124


Managing Quarantine

To configure the dedicated Office 365 Mail quarantine mailbox, go to Threat Protection > Config > Cloud
App Store > Office 365 Mail > Configure.

Gmail
To configure the dedicated Gmail quarantine mailbox, go to Threat Protection > Config > Cloud App Store
> Gmail > Configure

Harmony Email & Collaboration Administration Guide   |   125


Managing Quarantine

Restore Request Approver


You must specify a Restore request approver email account. This email account is used by the current
administrator in the Infinity Portal. This account is used to notify administrators when there is a user
requesting an email to be released from quarantine.

Office 365 Email


To configure the dedicated Office 365 Restore request approver, go to Threat Protection > Config >
Cloud App Store > Office 365 Mail > Configure

To configure the dedicated Office 365 Restore request approver, go to Threat Protection > Config >
Cloud App Store > Office Mail > Configure.

Gmail
To configure the dedicated Gmail Restore request approver, go to Threat Protection > Config > Cloud
App Store > Gmail > Configure.

Harmony Email & Collaboration Administration Guide   |   126


Managing Quarantine

Harmony Email & Collaboration Administration Guide   |   127


Anomaly Detection

Anomaly Detection
The Anomaly Detection engine detects behaviors and actions that seems abnormal when observed in the
context of an organization and a user's historical activity. It analyzes the behavior using machine-learning
algorithm that builds a profile based upon historical events including login locations and times, data-transfer
behavior, and email message patterns. Anomalies are often a sign that an account is compromised.
When an anomaly is detected, a security event is generated providing the context and other information
necessary for investigation. It also sends email alerts to administrators when an anomaly is detected.

Configuring Anomaly Detection


1. Go to Threat Protection > Config > Security Engines.
2. Under Anomaly Detection, click Configure.

3. To receive email alerts when an anomaly is detected, select the Email anomaly alerts to admins
check-box.
4. To stop creating "massive sender" anomaly when an email is sent to an unusually larger number of
recipients using a distribution list, select the Allow distribution list massive emails check-box.
5. To enable geo-suspicious events also within the same country, select the Enable Intra-Country geo-
suspicious events check-box.
6. Click Save.

Harmony Email & Collaboration Administration Guide   |   128


Anomaly Detection

Supported Anomalies
Reset Password Anomaly

This anomaly detects successful account takeovers. This anomaly is triggered when a user has received
three or more password reset emails (each from a different service) in a short amount of time.
It informs the administrator that a user has attempted to recover their password from three different
services.
Example: If someone wants to take over Joe's GitHub account, they may first try to take over his Gmail
account. Once they succeed in taking over his Gmail, they can use it to reset his password in the GitHub
account - and take it over it as well.

Massive senders

This anomaly is based on a baseline, generated during learning period during which we build a profile of
the users. After a baseline is established the engine starts measuring emails send rate, and generates an
alert when unusual high amount of emails are sent.
Event text - <user> has sent an unusual number of emails - at a rate of <rate> emails per minute.

Auto-forwarding to External Email Address

This anomaly is based on reading the Office 365 management events. It processes specific events
triggered when a mailbox auto-forwarding rule is created.

The anomaly does these tasks:


n Inspects new auto-forwarding rules created in Office 365
n Checks if the target email is 'external' to the organization. If the email is external, then an anomaly
is triggered.
Note - The anomaly's severity is decided based on the forwarding condition. If there is no condition, the
severity is set to high. By default, the severity is set to medium.

Unusual Country Anomaly

This anomaly detects incoming email from countries associated with phishing attempts and various types
of cyber attacks.
By default, these countries are Nigeria and China. The Allow-List allows you to ignore events from either
of these two countries.

Suspicious Geo Anomaly

This anomaly detects possible credential theft and use from another location. It detects the frequent login
and email events from different locations, and alerts the administrator about what is likely to be another
person operating from an account of a company employee.
It is possible to create Allow-List rule of accounts (for example, employees that use VPN or similar tools
on a frequent basis).

Harmony Email & Collaboration Administration Guide   |   129


Anomaly Detection

Suspicious MFA Login Failure

This anomaly detects login operations that failed during Multi Factor Authentication (MFA)/Second
Factor Authentication (2FA). To reduce the rate of false detection, it correlates the failed MFA with
additional events or follow-up successful login.
Event text - A suspicious login failure for <email>, attempting to login from <geo location>, failing at the
MFA stage.
Note - The detection is not generated in real time as it correlates and analyzes the past events and
successful logins. Alert may be generated a few hours after the failed login.

New delete-all-emails rule

This anomaly inspects new rules configured to delete all the incoming emails. It detects potential
malicious configuration to delete all the incoming emails. This behavior may indicate an account
takeover.
This anomaly has the highest impact.

Client is a vulnerable browser

This anomaly checks the client browser's vulnerability. It checks the browser version used by the end
user performing the event (when reported by the SaaS), and compares it to the list of old versions (with
known vulnerabilities).

Harmony Email & Collaboration Administration Guide   |   130


Managing Licenses

Managing Licenses
Under Threat Protection > Policy, you can create policy rules for each protected SaaS application. Each
rule can be applied to all users or a specific group of users that you define.
Note – Only user mailboxes with a valid license are protected by Harmony Email & Collaboration.

License configuration while onboarding


After activating Office 365 or Gmail, you will be asked to choose between assigning licenses to all your
organization or to a specific user group. Select a required group selection.
n All organization - Licenses will be assigned automatically to your user mailboxes.
n Specific group - Enter a name of the group in Office 365 or Google Workspace containing the user
mailboxes and/or groups of user mailboxes you wish to protect with Harmony Email & Collaboration.

Note - For TRIAL and EVAL contracts, Harmony Email & Collaboration protects only up to 500 user
mailboxes. If the total number of user mailboxes in the organization or the specific group is greater than 500,
the licenses are assigned alphabetically to the first 500 user mailboxes based on the display name in Office
365 or Google Workspace. If you need more licenses, contact Check Point Support.

License assignment with a commercial contract


After you sign a commercial contract, the licenses are assigned as per the contract to your User Center
account. To activate the Harmony Email & Collaboration contracts (licenses), you have to bind your User
Center account which holds the contracts, to Harmony Email & Collaboration.

To bind your User Center account with Harmony Email & Collaboration:
1. Log in to Harmony Email & Collaboration.
2. Click Global Settings > Contracts.

Harmony Email & Collaboration Administration Guide   |   131


Managing Licenses

Here you will see your current account status (Active/Trial/ Evaluation), your trial/contract expiration
date, and the number of licenses you have.
3. Click Associated Accounts at the top-right corner of the page.
Manage Accounts pop-up screen appears.

4. Click Attach Account.


5. Enter your Check Point User Center email and password, and click Next.

Harmony Email & Collaboration Administration Guide   |   132


Managing Licenses

6. Select the contracts to link to Harmony Email & Collaboration and click Finish.
The licenses are added to Harmony Email & Collaboration.

7. To select the user mailboxes that have to be protected by Harmony Email & Collaboration, see
"License configuration after onboarding" below.

License configuration after onboarding


To configure licenses:
1. Navigate to Threat Protection > Config > Cloud App Store.
2. Click Configure for Office 365 or Gmail.
3. In the pop-up that opens, click Configure groups filter.

Harmony Email & Collaboration Administration Guide   |   133


Managing Licenses

4. Select a group selection.


a. All organization - Licenses will be assigned automatically to your user mailboxes.
b. Specific group - Enter a name of the group in Office 365 or Google Workspace containing the
user mailboxes and/or groups of user mailboxes you wish to protect with Harmony Email &
Collaboration.
5. Click Ok.

Harmony Email & Collaboration Administration Guide   |   134


Managing Licenses

Notes:
n For TRIAL and EVAL contracts, Harmony Email & Collaboration protects only up to 500 user
mailboxes. If the total number of user mailboxes in the organization or the specific group is greater
than 500, the licenses are assigned alphabetically to the first 500 user mailboxes based on the
display name in Office 365 or Google Workspace. If you need more licenses, contact Check Point
Support.
n For commercial contracts, as per the contract signed when the license was purchased, you are
required to protect up to the number of licenses you purchased. In case you have more user
mailboxes in your Office 365 or Google Workspace than you purchased, you must use a specific
group of users. While all your user mailboxes will be automatically protected if you do not use a
specific group, Check Point reserves the right to disable the service due to a breach of contract. If you
need more licenses, contact Check Point Support.

Manual changes to license assignment


After configuring the licenses for a specific group or to the entire organization, you can choose to assign or
remove licenses to specific user mailboxes, if required.
To make the manual changes, navigate to Threat Protection > Config > Licenses.
The Licenses Configuration screen shows the usage status of your licenses and the individual licensing
status of user mailboxes.

The License Status column shows if the user mailbox is covered by a license. To add/remove the license to
a user mailbox, click Assign/Un-Assign.
Note – You can select multiple user mailboxes and assign or un-assign a license. The license assignment
might take up to four hours to become effective.

Harmony Email & Collaboration Administration Guide   |   135


Appendix

Appendix
Appendix A: Check Point Manual Integration
with Office 365
This topic describes how to perform a manual on-boarding and configuration process for Harmony Email &
Collaboration where customers bind their Office 365 environment to Harmony Email & Collaboration.
After you select to bind Harmony Email & Collaboration to your Office 365, the Office 365 Install Mode
window opens.
Select one of these modes:
n Automatic mode - Harmony Email & Collaboration automatically configures Office 365 emails to
operate in Detect modes (Monitor only and Detect and Prevent) and/or Protect (Inline) mode. You
only need to authorize the Harmony Email & Collaboration app during the wizard and all configuration
changes are applied automatically.
n Manual mode - You must manually perform the necessary configurations in the Office 365 Admin
Exchange Center before you bind the application.

This chapter explains the various settings that need to be configured in the Office 365 Exchange Admin
Center.

Harmony Email & Collaboration Administration Guide   |   136


Appendix

We recommend that you review if any of these scenarios listed below apply to you:
n You want to choose automatic mode but first want to learn the configuration changes that are
automatically applied to Office 365.
n You want to choose manual mode and need to know what the initial configuration should be.
n You are already using one of the Detect modes and moving to Protect (Inline) mode (in this case skip
to "Introduction - Protect (Inline) Mode" on page 152). Or, you are already in Protect (Inline) mode but
changing the scope of the policy groups it applies to (In this case, skip to "Step 9 - Transport Rules
(Protect (Inline) Mode)" on page 157). Make the changes in the Protect rule).

Note - In this guide, {portal} refers to your portal name. The portal name can be found in
the Office 365 Install window.

If you have any queries about how to apply these changes in the configuration, contact the Check Point
Support for assistance.

Policy Modes
These are the policy modes:
n Monitor only - Monitors the emails and creates the relevant event.
n Detect and Prevent - Creates an event, and also performs retroactive enforcement for Inbound
emails already delivered to users.
n Protect (Inline) - All emails are reviewed before delivery to the user.
Monitor only and Detect and Prevent have the same configuration and are sometimes referred to as
Detect modes in this document.
Best Practice - We recommend that you start with the configuration for Detect modes
and later change to Protect (Inline). If you are already in one of the Detect modes and
want to start with Protect (Inline) mode, skip to "Introduction - Protect (Inline) Mode" on
page 152.

Note - For the system to work properly, you must follow the steps in the order they appear.

Step 1 - Check Point Contact


The first step in Manual Integration is to add your dedicated Check Point Contact.
This contact is used for the Undeliverable Journal Reports under Journal Rules in "Step 2 - Journal Rule"
on page 140.
If you already configured a recipient for undeliverable journal rules, skip this step.
To add a contact

Step Instructions

1 Log in to your Office 365 admin account.

Harmony Email & Collaboration Administration Guide   |   137


Appendix

Step Instructions

2 In the Microsoft 365 admin center, select Exchange.

3 In the Exchange admin center, go to Recipients > Contacts.

4 Click the + icon and select Mail contact.

Harmony Email & Collaboration Administration Guide   |   138


Appendix

Step Instructions

5 In the New Mail Contact window, enter this information:


n First name - Check Point (Optional)
n Initials (Optional)
n Last name - Contact (Optional)
n Display name - Check Point Contact
n Alias - CheckPointContact
n External email address:
l If your data residency is in the United States use (replace "{portal}" with

your portal name):


{portal}@mt-prod-cp-1-journal-
error.checkpointcloudsec.com
l If your data residency is in Australia use (replace "{portal}" with your

portal name):
{portal}@mt-prod-cp-au-4-journal-
error.checkpointcloudsec.com
l If your data residency is in Europe use (replace "{portal}" with your portal

name):
{portal}@mt-prod-cp-eu-1-journal-
error.checkpointcloudsec.com

Harmony Email & Collaboration Administration Guide   |   139


Appendix

Step 2 - Journal Rule


The Journal rule is used only for Detect modes (Monitor only or Detect and Protect).
The Journal rule configures Office 365 to send a copy of all scoped emails to the journaling mailbox used by
Harmony Email & Collaboration for inspection.
Notes
n Before you create a Journal rule, you must specify a mailbox to receive the
Undeliverable journal report. If you already configured a mailbox for this purpose,
skip this step and define only the journal rule.
n The new Microsoft Exchange admin center (EAC) does not support Journal
Rule. To perform this procedure, click Classic Exchange admin center.

To define an address for Undeliverable journal reports

Step Instructions

1 In the Exchange admin center, go to Compliance management > Journal rules.

Harmony Email & Collaboration Administration Guide   |   140


Appendix

Step Instructions

2 Click Select address.

3 Click Browse and add the Check Point Contact created in "Step 1 - Check Point Contact"
on page 137.

To configure the Journal rule

Step Instructions

1 In the Exchange admin center, go to Compliance management > Journal rules.

2 Click the + icon to create a new Journal rule.

Harmony Email & Collaboration Administration Guide   |   141


Appendix

Step Instructions

3 Enter this information in the Journal Rule window:


n For Send journal reports to, enter (replace "{portal}" with your portal
name):
{portal}@{portal}-mail.checkpointcloudsec.com
n For Name, enter:
Check Point - Monitor
For If the message is sent to or received from..., select (Apply to all
messages).

Note - If you plan to use group filters in your setup, select the
group you want to include in your policy.

n For Journal the following messages..., select All messages.

4 Click Save.

Step 3 - Connectors
In this step, you define two connectors:
n Inbound connector - For all modes.
n Journaling Outbound - For Detect modes.
These connectors send traffic to and receive traffic from the cloud.

Note - These connectors are used for Detect modes. For information on the
configuration for Protect (Inline) mode, see "Introduction - Protect (Inline) Mode" on
page 152.
To create a new connector

Step Instructions

1 In the Exchange admin center, go to Mail flow > connectors.

2 Click the + icon to create a new connector.

Harmony Email & Collaboration Administration Guide   |   142


Appendix

To configure the Check Point Inbound connector

Step Instructions

1 For From, select Partner organization.

2 For To, select Office 365.

3 Click Next.

4 For Name, enter Check Point Inbound.

5 For Description, enter Check Point Inbound Connector.

6 For What do you want to do after the connector is saved?, select Turn it on.

7 Click Next.

8 For How do you want to identify the partner organization, select Use the sender's IP
address.

9 Click Next.

10 Under Specify the sender IP address range, click the + icon.

11 n If your data residency is in the United States, enter this IP address:


35.174.145.124
n If your data residency is in Europe, enter this IP address:
52.212.19.177
n If your data residency is in Australia, enter this IP address:
13.211.69.231

12 Click OK and then Next.

13 Under What security restrictions do you want to apply?,


select Reject email messages if they are not sent over TLS.

14 Click Next.

Harmony Email & Collaboration Administration Guide   |   143


Appendix

Step Instructions

15 In the Settings Confirmation window, make sure your settings are correct before you click
Save.

To create the Journaling Outbound connector

Step Instructions

1 In the Exchange admin center, go to Mail flow > Connectors.

2 Click the + icon to create a new connector.

To configure the Journaling Outbound connector

Step Instructions

1 For From, select Office 365.

Harmony Email & Collaboration Administration Guide   |   144


Appendix

Step Instructions

2 For To, select Partner organization.

3 Click Next.

4 For Name, enter:


Check Point Journaling Outbound

5 For Description (Optional), enter:


Check Point Journaling Outbound connector

6 For What do you want to do after connector is saved?, select Turn it on.

7 Click Next.

8 For When do you want to use this connector?,


select Only when email messages are sent to these domains.

9 Click the + icon to add a new domain (replace "{portal}" with your portal name):
{portal}-mail.checkpointcloudsec.com

10 Click OK and then Next.

11 Under How do you want to route email messages?, select Route email through these
smart hosts.

12 Click the + icon to add a smart host, and enter the host domain name (replace "{portal}"
with your portal name):
{portal}-host.checkpointcloudsec.com

13 Click Save and then Next.

14 Under How should Office 365 connect to your partner organization's email server?,
select Always use Transport Layer Security (TLS) to secure the connection.

15 For Connect only if the recipient's email server certificate matches this criteria,
select Any digital certificate, including self-signed certificates.

Harmony Email & Collaboration Administration Guide   |   145


Appendix

Step Instructions

16 Click Next.

17 Check your settings before validation and click Next.

Harmony Email & Collaboration Administration Guide   |   146


Appendix

Step Instructions

18 Click the + icon and enter this email address (replace "{portal}" with your portal name):
{portal}@{portal}-mail.checkpointcloudsec.com

19 Click Validate.

20 The validation result should be like this:

Harmony Email & Collaboration Administration Guide   |   147


Appendix

Step Instructions

21 Make sure that both connectors were created.

Step 4 - Connection Filter (All Modes)


Update the Connection Filter to Allow-list emails from Check Point.
This goes hand-in-hand with the Check Point Inbound Connector created in "Step 3 - Connectors " on
page 142.
To configure the connection filter

Step Instructions

1 In the Exchange admin center, go to Protection > Connection filter.

2 Click the icon to edit the default rule.

Harmony Email & Collaboration Administration Guide   |   148


Appendix

Step Instructions

3 Under Connection filtering > IP Allow list, click the + icon.

4 Under Add allowed IP address:


n If your data residency is in the United States, enter this IP
address:
35.174.145.124
n If your data residency is in Australia, enter this IP address:
13.211.69.231
n If your data residency is in Europe, enter this IP address:
52.212.19.177

Step 5 - On-boarding (Monitor only & Detect and Prevent)


In this step, you are ready to integrate Harmony Email & Collaboration with Office 365 for Monitor only and
Detect and Prevent modes.
To integrate Harmony Email & Collaboration with Office 365

Step Instructions

1 Log in to Harmony Email & Collaboration and select the relevant portal.

2 Click Threat Protection > Let's get started.

3 Select the Office 365 service and click Start.

Harmony Email & Collaboration Administration Guide   |   149


Appendix

Step Instructions

4 Select the Manual Mode checkbox.

5 Accept the License agreement and click Continue.

6 Authorize Office 365 event monitoring - click Continue.

7 Enter your Office 365 admin credentials and click Accept.

Harmony Email & Collaboration Administration Guide   |   150


Appendix

Step Instructions

8 Authorize Office 365 security - click Continue and accept the terms.
n If you selected Apply to all messages in "Step 2 - Journal Rule" on page 140, select
All Organization in the window below.
n If you specified a group, enter the group's name and click OK.

Note - The group's name must be identical to the one that appears on
Office 365.

9 Move to step 2:
Click Next and then Start Now.

Step 6 - Quarantine Mailbox (for Office 365 Mail Only)


The quarantine mailbox is a dedicated mailbox for suspicious/malicious emails.
Most of the emails in the quarantine mailbox contain a possible threat and/or sensitive information.
Quarantined emails can be tracked and restored in the Events and Quarantine pages on the portal.

Best Practice - We highly recommend that you restrict access to the Quarantine mailbox.

To configure the quarantine mailbox, you must first create an Office 365 user with mailbox.
To create an Office 365 user and mailbox

Step Instructions

1 Go to Threat Protection > Config > Cloud App Store.

Harmony Email & Collaboration Administration Guide   |   151


Appendix

Step Instructions

2 In the Active SaaS, click configure.

3 Under Quarantine and workflow > Dedicated quarantine mailbox, enter your dedicated
quarantine mailbox address.

Introduction - Protect (Inline) Mode


In Protect (Inline) mode, the system inspects all emails in scope before delivery to the users.
In manual mode, you must change the policy to Protect (Inline) before moving to Office 365 configurations.
To configure Protect (Inline) mode, follow Steps 7-9 below.

Note - To return to detect modes, disable the transport rules in "Step 9 - Transport Rules
(Protect (Inline) Mode)" on page 157.

Step 7 - Protect (Inline) Policy Configuration on Harmony


Email & Collaboration
To configure the Protect (Inline) policy

Step Instructions

1 Go to Threat Protection > Policy.

2 In Office 365 emails, change the Mode to Protect (Inline).

3 Select Configure excluded IPs manually in mail flow rule.

Harmony Email & Collaboration Administration Guide   |   152


Appendix

Step Instructions

4 Click Save and apply.

Step 8 - Connectors (Protect (Inline) Mode)


In this step, you define the outbound connector for Protect (Inline) mode.
To create the Check Point Outbound connector

Step Instructions

1 In the Exchange admin center, go to Mail Flow > connectors.

2 Click the + icon to create a new connector.

To configure the Check Point Outbound:

Step Instructions

1 For From, enter:


Office 365

2 For To, enter the partner organization.

Harmony Email & Collaboration Administration Guide   |   153


Appendix

Step Instructions

3 Click Next.

4 For Name, enter:


Check Point Outbound

5 For Description (Optional), enter:


Check Point Outbound Connector

6 For What do you want to do after connector is saved?,


select Turn it on and click Next.

7 For When do you want to use this connector?,


select Only when I have a transport rule to set up that redirects messages to this
connector
and click Next.

8 For How do you want to route email messages?,


select Route email through these smart hosts.

9 Click the + icon to add a smart host (replace "{portal}" with your portal name):
{portal}-host.checkpointcloudsec.com

10 Click Save and then Next.

11 For How should Office Office 365 connect to your partner organization's email server?,
select Always use Transport Layer Security (TLS) to secure the connection.

Harmony Email & Collaboration Administration Guide   |   154


Appendix

Step Instructions

12 For Connect only if the recipient's email server certificate matches this criteria,
select Any digital certificate, including self-signed certificates
and click Next.

13 Confirm your settings before validation and click Next.

Harmony Email & Collaboration Administration Guide   |   155


Appendix

Step Instructions

14 Click the + icon and enter this address (replace "{portal}" with your portal name):
{portal}@{portal}-mail.checkpointcloudsec.com

15 Click Validate.

16 The validation result should look like this:

Harmony Email & Collaboration Administration Guide   |   156


Appendix

Step 9 - Transport Rules (Protect (Inline) Mode)


The purpose of the transport rule is to implement the inline mode for the users that need to be inline. Every
time you change the scope of the inline policy (add or remove users/groups) you need to edit the scope of
the transport rule accordingly.

Note - If any mail flow rules already exist, the Check Point rules must be prioritized.

These are the Check Point rules:


1. "Check Point - Protect" below
2. "Check Point - Allow-List" on page 161
3. "Check Point - Junk Filter" on page 163

Check Point - Protect


To create the Check Point - Protect rule

1. In the Exchange admin center, go to Mail flow > Rules.


2. Click + icon to add a rule.

To configure the Check Point - Protect rule as the first mail-flow rule

Step Instructions

1 For Name, enter Check Point - Protect.

Harmony Email & Collaboration Administration Guide   |   157


Appendix

Step Instructions

2 For Apply this rule if..., add two conditions:


n First condition - The sender is located outside the organization.

n Second condition - The recipient is located inside the organization.

If necessary, add another condition and specify the groups that should be inline.

Harmony Email & Collaboration Administration Guide   |   158


Appendix

Step Instructions

3 For Do the following..., add two actions:


n First action - Set a message header:

l For Set the message header, enter this Key:


X-CLOUD-SEC-AV-Info
l For to the value, enter this Value (replace "{portal}" with your portal
name):
{portal}, office365_emails, inline

n Second action - Use the following connector, select Check Point Outbound
connector.

Harmony Email & Collaboration Administration Guide   |   159


Appendix

Step Instructions

4 For Except if..., add two exceptions:


n First exception - The message has an SCL greater than or equal to...5.

n Second exception - Sender's IP address is in the range:


l If your data residency is in the United States, enter this IP address:

35.174.145.124
l If your data residency is in Australia, enter this IP address:

13.211.69.231
l If your data residency is in Europe, enter this IP address:

52.212.19.177

Note - If you have other inbound connectors using IP addresses, add their IP
addresses to this list.

5 Select the checkbox for Stop processing more rules.

6 Click Save.

Harmony Email & Collaboration Administration Guide   |   160


Appendix

Step Instructions

7 Make sure that Check Point - Protect rule is configured like this:

Check Point - Allow-List


To configure the Check Point Allow-List rule

Step Instructions

1 For Name, enter:


Check Point - Allow-List

Harmony Email & Collaboration Administration Guide   |   161


Appendix

Step Instructions

2 For Apply this rule if..., Sender's IP address is in the range:


n If your data residency is in the United States, enter this IP address:
35.174.145.124
n If your data residency is in Europe, enter this IP address:
52.212.19.177
n If your data residency is in Australia, enter this IP address:
13.211.69.231

3 For Do the following..., set the spam confidence level (SCL) to...Bypass spam filtering.

4 For Except if..., select A message header matches these text patterns.

5 For text patterns, select X-CLOUD-SEC-AV-SCL header matches true.

Harmony Email & Collaboration Administration Guide   |   162


Appendix

Step Instructions

6 Make sure that the Check Point - Allow-List rule is configured like this:

Check Point - Junk Filter


To configure the Check Point Junk filter rule

Step Instructions

1 For Name, enter:


Check Point - Junk Filter

Harmony Email & Collaboration Administration Guide   |   163


Appendix

Step Instructions

2 For Apply this rule if..., add two conditions:


n First condition - A message header matches these patterns:
l For the header enter: X-CLOUD-SEC-AV-SCL

l For the text patterns enter: true

n Second condition - Senders IP address is in the range:


l If your data residency is in the United States, enter this

IP address:
35.174.145.124
l If your data residency is in Europe, enter this IP

address:
52.212.19.177
l If your data residency is in Australia, enter this IP

address:
13.211.69.231

3 For Do the following...:

Harmony Email & Collaboration Administration Guide   |   164


Appendix

Step Instructions

4 Make sure that the Check Point - Junk filter rule is configured like this:

5 Make sure all the rules were created.

Transport Rules
Office 365 Transport rules automate actions on emails-in-traffic based on custom policies. In most
enterprise environments, every transport rule falls under either Delivery Rule or Modification Rule.
Delivery Rule: A transport rule that modifies the delivery of the email

n Quarantine emails from "abc.com"


n Allow-List emails coming from IP 111.111.111.111
n Mark emails with Nickname = "John" as Spam (SCL)
n Send emails to Connector XYZ
n Forward emails sent to X to Y

Modification Rule: A transport rule that modifies the content of the email

n Add "[EXTERNAL]" to the subject if sender is Outside Organization


n Add disclaimer to the email body footer

Harmony Email & Collaboration Administration Guide   |   165


Appendix

Check Point Transport Rule Optimal Priority

The Check Point Protect policy for Office 365 Exchange automatically creates a transport rule with the
name of "Check Point - Protect" with default priority of 0 (highest priority).
Unless you have a reason to keep your rules in a specific order, keep the Delivery Rules on top of the
Modification Rules. Place the Check Point Protect Rule between the Delivery Rules and the Modification
Rules.
Consult with Check Point Support if one of these is true:
n There is a 3rd party integration that receives the mail-flow.

n The rules only function is a specific order.

Harmony Email & Collaboration Administration Guide   |   166


Appendix B: DLP Built-in Rules and Categories

Appendix B: DLP Built-in Rules and Categories


DLP Rules
DLP Rules represent the data being looked for in emails, attachments, files, and messages.
Each DLP rule is assigned a geographical region that it fits in. All the DLP rules are either Global or relate to
a specific country.
These are the built-in DLP rules in Harmony Email & Collaboration.

Global Rules
The Global built-in rules for Harmony Email & Collaboration DLP are as follows.

Rule Name Description

Advertising Identifiers used by developers to track users for advertising purposes. These include
identifier Google Play Advertising IDs, Amazon Advertising IDs, Apple's
identifierForAdvertising (IDFA), and Apple's identifierForVendor (IDFV).

Age of an An age measured in months or years.


individual

Credit card A credit card number is 12 to 19 digits long. They are used for payment transactions
number globally.

Credit card track A credit card track number is a variable length alphanumeric string. It is used to store
number key cardholder information.

Date of birth A date of birth

Domain name A domain name as defined by the DNS standard.

Email address An email address identifies the mailbox that emails are sent to or from. The
maximum length of the domain name is 255 characters, and the maximum length of
the local-part is 64 characters.

Ethnic group A person’s ethnic group.

Female name A common female name.

First name A first name is defined as the first part of a Person Name.

Gender A person’s gender identity.

Generic id Alphanumeric and special character strings that may be personally identifying but do
not belong to a well-defined category, such as user IDs or medical record numbers.

Harmony Email & Collaboration Administration Guide   |   167


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

IBAN Americas An International Bank Account Number (IBAN) is an internationally agreed-upon


method for identifying bank accounts defined by the International Standard of
Organization (ISO) 13616:2007 standard. An IBAN consists of up to 34
alphanumeric characters, including elements such as a country code or account
number. This rule detects American IBAN formats.

IBAN Asia An International Bank Account Number (IBAN) is an internationally agreed-upon


method for identifying bank accounts defined by the International Standard of
Organization (ISO) 13616:2007 standard. An IBAN consists of up to 34
alphanumeric characters, including elements such as a country code or account
number. This rule detects Asian IBAN formats (see here:
https://www.iban.com/structure,https://bfsfcu.org/pdf/IBAN.pdf).

IBAN Africa An International Bank Account Number (IBAN) is an internationally agreed-upon


method for identifying bank accounts defined by the International Standard of
Organization (ISO) 13616:2007 standard. An IBAN consists of up to 34
alphanumeric characters, including elements such as a country code or account
number. This rule detects African IBAN formats (see here:
https://www.iban.com/structure,https://bfsfcu.org/pdf/IBAN.pdf).

IBAN Europe An International Bank Account Number (IBAN) is an internationally agreed-upon


method for identifying bank accounts defined by the International Standard of
Organization (ISO) 13616:2007 standard. An IBAN consists of up to 34
alphanumeric characters, including elements such as a country code or account
number. This rule detects European IBAN formats (see here:
https://www.iban.com/structure,https://bfsfcu.org/pdf/IBAN.pdf).

HTTP cookie and An HTTP cookie is a standard way of storing data on a per website basis. This
set-cookie detector will find headers containing these cookies.
headers

ICD9 code The International Classification of Diseases, Ninth Revision, Clinical Modification
(ICD-9-CM) lexicon is used to assign diagnostic and procedure codes associated
with inpatient, outpatient, and physician office use in the United States. The US
National Center for Health Statistics (NCHS) created the ICD-9-CM lexicon. It is
based on the ICD-9 lexicon, but provides for more morbidity detail. The ICD-9-CM
lexicon is updated annually on October 1.

ICD10 code Like ICD-9-CM codes, the International Classification of Diseases, Tenth Revision,
Clinical Modification (ICD-10-CM) lexicon is a series of diagnostic codes. The World
Health Organization (WHO) publishes the ICD-10-CM lexicon to describe causes of
morbidity and mortality.

Patient Detects leaked medical patient information. The detection is based on matching
Information health codes and various personal information patterns.

Phone IMEI An International Mobile Equipment Identity (IMEI) hardware identifier, used to
number identify mobile phones.

IP address An Internet Protocol (IP) address (either IPv4 or IPv6).

Last name A last name is defined as the last part of a Person Name.

Harmony Email & Collaboration Administration Guide   |   168


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

Street addresses A physical address or location.


and landmarks

MAC address A media access control address (MAC address), which is an identifier for a network
adapter.

Local MAC A local media access control address (MAC address), which is an identifier for a
address network adapter.

Male name A common male name.

Medical term Terms that commonly refer to a person's medical condition or health. 

Local MAC A local media access control address (MAC address), which is an identifier for a
address network adapter.

Organization A name of a chain store, business or organization.


name

Passport A passport number that matches passport numbers for the following countries:
Number Australia, Canada, China, France, Germany, Japan, Korea, Mexico, The
Netherlands, Poland, Singapore, Spain, Sweden, Taiwan, United Kingdom, and the
United States.

Person name A full person name, which can include first names, middle names or initials, and last
names.

Phone number A telephone number.

Street address A street address.

Bank SWIFT A SWIFT code is the same as a Bank Identifier Code (BIC). It's a unique
routing number identification code for a particular bank. These codes are used when transferring
money between banks, particularly for international wire transfers. Banks also use
the codes for exchanging other messages.

Date or Time A date. This Rule name includes most date formats, including the names of common
world holidays. 

Human readable A timestamp of a specific time of day, e.g. 9:54 pm.


time

URL A Uniform Resource Locator (URL).

Vehicle A vehicle identification number (VIN) is a unique 17-digit code assigned to every on-
identification road motor vehicle.
number

Authentication An authentication token is a machine-readable way of determining whether a


token particular request has been authorized for a user. This detector currently identifies
tokens that comply with OAuth or Bearer authentication.

Harmony Email & Collaboration Administration Guide   |   169


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

Amazon Web Amazon Web Services account access keys.


Services
credentials

Azure JSON web Microsoft Azure certificate credentials for application authentication.
token

HTTP Basic A basic authentication header is an HTTP header used to identify a user to a server.
authentication It is part of the HTTP specification in RFC 1945, section 11.
header

Encryption key An encryption key within configuration, code, or log text.

Google Cloud Google Cloud API key. An encrypted string that is used when calling Google Cloud
Platform API key APIs that don't need to access private user data.

Google Cloud Google Cloud service account credentials. Credentials that can be used to
Platform service authenticate with Google API client libraries and service accounts.
account
credentials

JSON web token JSON Web Token. JSON Web Token in compact form. Represents a set of claims
as a JSON object that is digitally signed using JSON Web Signature.

Password Clear text passwords in configs, code, and other text.

Top 100,000 A weakly hashed password is a method of storing a password that is easy to reverse
most common engineer. The presence of such hashes often indicate that a system's security can
weakly hashed be improved.
passwords

Common An XSRF token is an HTTP header that is commonly used to prevent cross-site
headers scripting attacks. Cross-site scripting is a type of security vulnerability that can be
containing XSRF exploited by malicious sites.
tokens

Country Specific Rules


Argentina

Rule Name Description

Argentina identity An Argentine Documento Nacional de Identidad (DNI), or national identity card, is
card number used as the main identity document for citizens.

Harmony Email & Collaboration Administration Guide   |   170


Appendix B: DLP Built-in Rules and Categories

Australia

Rule Name Description

Australia An Australian driver's license number.


driver’s
license
number

Australia A 9-digit Australian Medicare account number is issued to permanent residents of


medicare Australia (except for Norfolk island). The primary purpose of this number is to prove
number Medicare eligibility to receive subsidized care in Australia.

Australia An Australian passport number.


passport
number

Australia An Australian tax file number (TFN) is a number issued by the Australian Tax Office for
tax file taxpayer identification. Every taxpaying entity, such as an individual or an organization, is
number assigned a unique number.

Belgium

Rule Name Description

Belgium National Identity card number A 12-digit Belgian national identity card number.

Brazil

Rule Name Description

Brazil individual The Brazilian Cadastro de Pessoas Físicas (CPF) number, or Natural Persons
taxpayer identification Register number, is an 11-digit number used in Brazil for taxpayer
number identification.

Canada

Rule Name Description

Canada A Canadian bank account number.


bank
account
number

British The British Columbia Personal Health Number (PHN) is issued to citizens, permanent
Columbia residents, temporary workers, students, and other individuals who are entitled to health
public health care coverage in the Province of British Columbia.
network
number

Harmony Email & Collaboration Administration Guide   |   171


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

Canada A driver's license number for each of the ten provinces in Canada (the three territories
driver’s are currently not covered).
license
number

Ontario The Ontario Health Insurance Plan (OHIP) number is issued to citizens, permanent
health residents, temporary workers, students, and other individuals who are entitled to health
insurance care coverage in the Province of Ontario.
number

Canada A Canadian passport number.


passport
number

Quebec The Québec Health Insurance Number (also known as the RAMQ number) is issued to
health citizens, permanent residents, temporary workers, students, and other individuals who
insurance are entitled to health care coverage in the Province of Québec.
number

Canada The Canadian Social Insurance Number (SIN) is the main identifier used in Canada for
social citizens, permanent residents, and people on work or study visas. With a Canadian SIN
insurance and mailing address, one can apply for health care coverage, driver's licenses, and other
number important services.

Chile

Rule Name Description

Chile identity card A Chilean Cédula de Identidad (CDI), or identity card, is used as the main identity
number document for citizens.

China

Rule Name Description

China resident number A Chinese resident identification number.

China passport number A Chinese passport number.

Colombia

Rule Name Description

Colombia identity A Colombian Cédula de Ciudadanía (CDC), or citizenship card, is used as the
card number main identity document for citizens.

Harmony Email & Collaboration Administration Guide   |   172


Appendix B: DLP Built-in Rules and Categories

Denmark

Rule Name Description

Denmark A Personal Identification Number (CPR, Det Centrale Personregister) is a national ID


CPR number in Denmark. It is used with public agencies such as health care and tax
Number authorities. Banks and insurance companies also use it as a customer number. The CPR
number is required for people who reside in Denmark, pay tax or own property there.

France

Rule Name Description

France national The French Carte Nationale d'Identité Sécurisée (CNI or CNIS) is the French national
identity card identity card. It's an official identity document consisting of a 12-digit identification
number number. This number is commonly used when opening bank accounts and when
paying by check. It can sometimes be used instead of a passport or visa within the
European Union (EU) and in some other countries.

France national The French Numéro d'Inscription au Répertoire (NIR) is a permanent personal
insurance identification number that's also known as the French social security number for
number services including healthcare and pensions.

France A French passport number.


passport
number

France tax The French tax identification number is a government-issued ID for all individuals
identification paying taxes in France.
number

Finland

Rule Name Description

Finland A Finnish personal identity code, a national government identification number for
personal Finnish citizens used on identity cards, driver's licenses and passports.
identity code

Germany

Rule Name Description

Germany A German driver's license number.


driver's license
number

German identity The German Personalausweis, or identity card, is used as the main identity
card number document for citizens of Germany.

Harmony Email & Collaboration Administration Guide   |   173


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

Germany A German passport number. The format of a German passport number is 10


passport number alphanumeric characters, chosen from numerals 0–9 and letters C, F, G, H, J, K, L,
M, N, P, R, T, V, W, X, Y, Z.

Germany An 11-digit German taxpayer identification number assigned to both natural-born and
taxpayer other legal residents of Germany for the purposes of recording tax payments.
identification
number

Germany Schufa A German Schufa identification number. Schufa Holding AG is a German credit
identification bureau whose aim is to protect clients from credit risk.
number

Hong Kong

Rule Name Description

Hong Kong identity The 香港 身份證 , or Hong Kong identity card (HKIC), is used as the main
card number identity document for citizens of Hong Kong.

India

Rule Name Description

India Aadhaar The Indian Aadhaar number is a 12-digit unique identity number obtained by residents
number of India, based on their biometric and demographic data.

India GST The Indian GST identification number (GSTIN) is a unique identifier required of every
identification business in India for taxation.
number

India The Indian Personal Permanent Account Number (PAN) is a unique 10-digit
permanent alphanumeric identifier used for identification of individuals—particularly people who
account pay income tax. It's issued by the Indian Income Tax Department. The PAN is valid for
number the lifetime of the holder.

Indonesia

Rule Name Description

Indonesia identity An Indonesian Single Identity Number (Nomor Induk Kependudukan, or NIK) is the
number (Nomor national identification number of Indonesia. The NIK is used as the basis for
Induk issuing Indonesian resident identity cards (Kartu Tanda Penduduk, or KTP),
Kependudukan) passports, driver's licenses and other identity documents.

Harmony Email & Collaboration Administration Guide   |   174


Appendix B: DLP Built-in Rules and Categories

Ireland

Rule Name Description

Ireland driving license An Irish driving license number.


number

Ireland Eircode Eircode is an Irish postal code that uniquely identifies an address.

Ireland passport An Irish (IE) passport number.


number

Ireland Personal The Irish Personal Public Service Number (PPS number, or PPSN) is a unique
Public Service number for accessing social welfare benefits, public services, and information in
Number (PPSN) Ireland.

Israel

Rule
Description
Name

Israel The Israel identity card number is issued to all Israeli citizens at birth by the Ministry of the
identity Interior. Temporary residents are assigned a number when they receive temporary
card resident status.
number

Italy

Rule Name Description

Italy fiscal code An Italy fiscal code number is a unique 16-digit code assigned to Italian citizens as
number a form of identification.

Japan

Rule Name Description

Japan bank account A Japanese bank account number.


number

Japan driver's license A Japanese driver's license number.


number

Japan individual The Japanese national identification number—sometimes referred to as "My


number or "My Number"—is a new national ID number as of January 2016.
Number"

Japan passport A Japanese passport number. The passport number consists of two alphabetic
number characters followed by seven digits.

Harmony Email & Collaboration Administration Guide   |   175


Appendix B: DLP Built-in Rules and Categories

Korea

Rule Name Description

Korea passport number A Korean passport number.

Korea resident registration number A South Korean Social Security number.

Mexico

Rule Name Description

Mexico The Mexico Clave Única de Registro de Población (CURP) number, or Unique
population Population Registry Code or Personal Identification Code number. The CURP number is
registry an 18-character state-issued identification number assigned by the Mexican government
number to citizens or residents of Mexico and used for taxpayer identification.

Mexico A Mexican passport number.


passport
number

The Netherlands

Rule Name Description

Netherlands A Dutch Burgerservicenummer (BSN), or Citizen's Service Number, is a state-issued


citizen service identification number that's on driver's licenses, passports, and international ID cards.
number

Netherlands A Dutch passport number.


passport
number

Norway

Rule Name Description

Norway Norway‘s Fødselsnummer, National Identification Number, or Birth Number is


national assigned at birth, or on migration into the country. It is registered with the Norwegian
identity Tax Office.
number

Paraguay

Rule Name Description

Paraguay identity A Paraguayan Cédula de Identidad Civil (CIC), or civil identity card, is used as
card number the main identity document for citizens.

Harmony Email & Collaboration Administration Guide   |   176


Appendix B: DLP Built-in Rules and Categories

Peru

Rule Name Description

Peru identity A Peruvian Documento Nacional de Identidad (DNI), or national identity card, is used
card number as the main identity document for citizens.

Poland

Rule Name Description

Poland The PESEL number is the national identification number used in Poland. It is mandatory
PESEL for all permanent residents of Poland, and for temporary residents staying there longer
number than 2 months. It is assigned to just one person and cannot be changed.

Poland The Polish identity card number. is a government identification number for Polish citizens.
national id Every citizen older than 18 years must have an identity card. The local Office of Civic
number Affairs issues the card, and each card has its own unique number.

Poland A Polish passport number. Polish passport is an international travel document for Polish
Passport citizens. It can also be used as a proof of Polish citizenship.

Portugal

Rule Name Description

Portugal A Portuguese Cartão de cidadão (CDC), or Citizen Card, is used as the main identity,
identity card Social Security, health services, taxpayer, and voter document for citizens.
number

Singapore

Rule Name Description

Singapore national A unique set of nine alpha-numeric characters on the Singapore National
registration number Registration Identity Card.

Singapore passport number A Singaporean passport number.

Spain

Rule Name Description

Spain CIF or The Spanish Código de Identificación Fiscal (CIF) was the tax identification system
Código de used in Spain for legal entities until 2008. It was then replaced by the Número de
Identificación Identificación Fiscal (NIF) for natural and juridical persons.
Fiscal

Harmony Email & Collaboration Administration Guide   |   177


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

Spain DNI or A Spain national identity number.


Documento
Nacional de
Identidad

Spain driver's A Spanish driver's license number.


license number

Spain foreigner The Spanish Número de Identificación de Extranjeros (NIE) is an identification


tax identification number for foreigners living or doing business in Spain. An NIE number is needed for
number key transactions such as opening a bank account, buying a car, or setting up a mobile
phone contract.

Spain tax The Spanish Número de Identificación Fiscal (NIF) is a government identification
identification number for Spanish citizens. An NIF number is needed for key transactions such as
number opening a bank account, buying a car, or setting up a mobile phone contract.

Spain passport A Spanish Ordinary Passport (Pasaporte Ordinario) number. There are 4 different
number types of passports in Spain. This detector is for the Ordinary Passport (Pasaporte
Ordinario) type, which is issued for ordinary travel, such as vacations and business
trips.

Spain social The Spanish Social Security number (Número de Afiliación a la Seguridad Social) is a
security number 10-digit sequence that identifies a person in Spain for all interactions with the
country's Social Security system.

Sweden

Rule Name Description

Sweden personal A Swedish Personal Identity Number (personnummer), a national government


identity number identification number for Swedish citizens.

Sweden passport A Swedish passport number.


number

Taiwan

Rule Name Description

Taiwan passport number A Taiwanese passport number.

Thailand

Rule Name Description

Thai national identification The Thai บั ตรประจำ ตั วประชาชนไทย, or identity card, is used as the main
card number identity document for Thai nationals.

Harmony Email & Collaboration Administration Guide   |   178


Appendix B: DLP Built-in Rules and Categories

Turkey

Rule Name Description

Turkish identification A unique Turkish personal identification number, assigned to every citizen
number of Turkey.

United Kingdom

Rule Name Description

Scotland The Scotland Community Health Index Number (CHI number) is a 10-digit sequence
community used to uniquely identify a patient within National Health Service Scotland (NHS
health index Scotland).
number

United A driver's license number for the United Kingdom of Great Britain and Northern Ireland
Kingdom (UK).
drivers
license
number

United A National Health Service (NHS) number is the unique number allocated to a registered
Kingdom user of the three public health services in England, Wales, and the Isle of Man.
national
health service
number

United The National Insurance number (NINO) is a number used in the United Kingdom (UK) in
Kingdom the administration of the National Insurance or social security system. It identifies
national people, and is also used for some purposes in the UK tax system. The number is
insurance sometimes referred to as NI No or NINO.
number

United A United Kingdom (UK) passport number.


Kingdom
passport
number

United A United Kingdom (UK) Unique Taxpayer Reference (UTR) number. This number,
Kingdom comprised of a string of 10 decimal digits, is an identifier used by the UK government to
taxpayer manage the taxation system. Unlike other identifiers, such as the passport number or
reference social insurance number, the UTR is not listed on official identity cards.
number

Harmony Email & Collaboration Administration Guide   |   179


Appendix B: DLP Built-in Rules and Categories

United States

Rule Name Description

American An American Bankers' Committee on Uniform Security Identification Procedures


Bankers CUSIP (CUSIP) number is a 9-character alphanumeric code that identifies a North American
ID financial security.

Medical drug The US National Drug Code (NDC) is a unique identifier for drug products, mandated
names in the United States by the Food and Drug Administration (FDA).

USA Adoption A United States Adoption Taxpayer Identification Number (ATIN) is a type of United
Taxpayer States Tax Identification Number (TIN). An ATIN is issued by the Internal Revenue
Identification Service (IRS) to individuals who are in the process of legally adopting a US citizen or
Number resident child.

USA bank The American Bankers Association (ABA) Routing Number (also called the transit
routing number number) is a nine-digit code. It's used to identify the financial institution that's
responsible to credit or entitled to receive credit for a check or electronic transaction.

USA Current Current Procedural Terminology (CPT) detects codes, descriptions, and guidelines
Procedural intended to describe procedures and services performed by physicians and other
Terminology health care providers. Matches five-digit CPT codes combined with medical key words
detections (i.e. 'procedural').

US DEA A US Drug Enforcement Administration (DEA) number is assigned to a health care


number provider by the US DEA. It allows the health care provider to write prescriptions for
controlled substances. The DEA number is often used as a general "prescriber
number" that is a unique identifier for anyone who can prescribe medication.

USA drivers A driver's license number for the United States. Format can vary depending on the
license number issuing state.

Employer A United States Employer Identification Number (EIN) is also known as a Federal Tax
Identification Identification Number, and is used to identify a business entity.
Number

USA The US National Provider Identifier (NPI) is a unique 10-digit identification number
healthcare issued to health care providers in the United States by the Centers for Medicare and
national Medicaid Services (CMS). The NPI has replaced the unique provider identification
provider number (UPIN) as the required identifier for Medicare services. It's also used by other
identifier payers, including commercial healthcare insurers.

USA Individual A United States Individual Taxpayer Identification Number (ITIN) is a type of Tax
Taxpayer Identification Number (TIN), issued by the Internal Revenue Service (IRS). An ITIN is
Identification a tax processing number only available for certain nonresident and resident aliens,
Number their spouses, and dependents who cannot get a Social Security Number (SSN).

USA Medical A Medical Record Number (MRN) matches the default format XXX-X-XXXXX, with or
Record without dashes, in close proximity to medical terms (such as MRN, medical, record).
Number

Harmony Email & Collaboration Administration Guide   |   180


Appendix B: DLP Built-in Rules and Categories

Rule Name Description

USA Medical Matches a Medical Record Number (MRN, see above) patterns in a less rigid
Record formatting, in a close proximity to medical terms (such as MRN, medical, record).
Number - Open Note: this detection rule matches more patterns, thus presents increased probability
Format for false detections. Recommended to be used combined with additional rules for
detection.

USA passport A United States passport number.


number

USA Preparer A United States Preparer Taxpayer Identification Number (PTIN) is an identification
Taxpayer number that all paid tax return preparers must use on US federal tax returns or claims
Identification for refund submitted to the US Internal Revenue Service (IRS).
Number

US Social A United States Social Security number (SSN) is a 9-digit number issued to US
Security citizens, permanent residents, and temporary residents. This detector will not match
Number against numbers with all zeroes in any digit group (that is, 000-##-####, ###-00-####,
or ###-##-0000), against numbers with 666 in the first digit group, or against numbers
whose first digit is 9.

USA state A United States state name.


name

USA toll free A US toll-free telephone number.


phone number

USA vehicle A vehicle identification number (VIN) is a unique 17-digit code assigned to every on-
identification road motor vehicle in North America.
number

Uruguay

Rule Name Description

Uruguay identity card A Uruguayan Cédula de Identidad (CDI), or identity card, is used as the main
number identity document for citizens.

Venezuela

Rule Name Description

Venezuela identity A Venezuelan Cédula de Identidad (CDI), or national identity card, is used as the
card number main identity document for citizens.

Harmony Email & Collaboration Administration Guide   |   181


Appendix B: DLP Built-in Rules and Categories

DLP Categories
The table below shows the default rules of each DLP category for Infinity Portal accounts residing in
different regions.
Note - To configure the DLP rules of each of the DLP categories, see "Configuring DLP Categories" on
page 41.

DLP Default rules for Infinity Portal accounts Default rules for Infinity Portal accounts
Category residing in US/Canada region residing in other regions

PHI ICD9 description match ICD9 description match


ICD10 description match ICD10 description match
USA healthcare national provider identifier Australia medicare number
British Columbia public health network
number
Ontario health insurance number
Quebec health insurance number
Ireland Personal Public Service Number
(PPSN)
Scotland community health index
number
United Kingdom national health service
number
USA healthcare national provider
identifier

Harmony Email & Collaboration Administration Guide   |   182


Appendix B: DLP Built-in Rules and Categories

DLP Default rules for Infinity Portal accounts Default rules for Infinity Portal accounts
Category residing in US/Canada region residing in other regions

PII Passport number Passport number


USA drivers license number Vehicle identification number
USA passport number Argentina identity card number
USA social security number Australia driver's license number
USA vehicle identification number Australia passport number
Belgium National Identity card number
Brazil individual taxpayer identification
number
Canada driver's license number
Canada passport number
Canada social insurance number
Chile identity card number
China resident number
China passport number
Colombia identity card number
Denmark CPR number
France national identity card number
France national insurance number
France passport number
Finland personal identity code
Germany driver's license number
German identity card number
German passport number
Hong Kong identity card number
India Aadhaar number
India permanent account number
Indonesia identity number (Nomor Induk
Kopenduduken)
Ireland driver license number
Ireland passport number
Israel identity card number
Italy fiscal code number
Japan driver's license number
Japan individual number or "My Number"
Japan passport number
Korea passport number
Korea resident registration number
Mexico population registry number
Mexico passport number
Netherlands citizen service number
Norway national identity number
Paraguay identity card number
Peru identity card number
Poland PESEL number
Poland national id number
Poland passport
Portugal identity card number
Singapore national registration number
Singapore passport number

Harmony Email & Collaboration Administration Guide   |   183


Appendix B: DLP Built-in Rules and Categories

DLP Default rules for Infinity Portal accounts Default rules for Infinity Portal accounts
Category residing in US/Canada region residing in other regions

Spain DNI or Documento Nacional de


Identidad
Spain driver's license number
Spain foreigner tax identification number
Spain tax identification number
Spain passport number
Spain social security number
Sweden personal identity number
Sweden passport number
Taiwan passport number
Thai national identification card number
Turkish identification number
United Kingdom drivers license number
United Kingdom national insurance
number
United Kingdom passport number
USA drivers license number
USA passport number
USA social security number
Uruguay identity card number
Venezuela identity card number

Financial Bank SWIFT routing number Bank SWIFT routing number


IBAN Africa IBAN Africa
IBAN Americas IBAN Americas
IBAN Asia IBAN Asia
IBAN Europe IBAN Europe
American Bankers CUSIP identifier Australia tax file number
USA Adoption Taxpayer Identification Canada bank account number
number France tax identification number
USA bank routing number Germany taxpayer identification number
USA Individual Taxpayer Identification Germany Schufa identification number
Number India GST identification number
USA Preparer Taxpayer Identification Japan bank account number
Number Spain CIF or Código de Identificación
Fiscal
United Kingdom taxpayer reference
number
American Bankers CUSIP identifier
USA Adoption Taxpayer Identification
number
USA bank routing number
USA Employer Identification Number
USA Individual Taxpayer Identification
Number
USA Preparer Taxpayer Identification
Number

Harmony Email & Collaboration Administration Guide   |   184


Appendix B: DLP Built-in Rules and Categories

DLP Default rules for Infinity Portal accounts Default rules for Infinity Portal accounts
Category residing in US/Canada region residing in other regions

Access Advertising Identifier Advertising Identifier


Control Phone IMEI number Phone IMEI number
MAC address MAC address
Local MAC address Local MAC address
Authentication token Authentication token
Amazon Web Services credentials Amazon Web Services credentials
Azure JSON Web Token Azure JSON Web Token
HTTP basic authentication header HTTP basic authentication header
Encryption key Encryption key
Google Cloud Platform API key Google Cloud Platform API key
Google Cloud Platform service account Google Cloud Platform service account
credentials credentials
JSON Web Token JSON Web Token
Top 100,000 most common weekly hashed Top 100,000 most common weekly
passwords hashed passwords
Common headers containing xsrf tokens Common headers containing xsrf tokens

PCI Credit card number Credit card number


Credit card track number Credit card track number

HIPPA ICD9 description match ICD9 description match


ICD10 description match ICD10 description match
USA DEA number USA DEA number
USA healthcare national provider identifier USA healthcare national provider
USA Medical Record Number (MRN) identifier
USA Current Procedural Terminology (CPT)

Harmony Email & Collaboration Administration Guide   |   185


Appendix C: Troubleshooting

Appendix C: Troubleshooting
Common user issues and solutions:

Issue Solution

Errors for protected SaaS service below the Overview page

If automatic configuration mode was done, these errors indicate, in


most cases, enabled Office 365/Google Workspace MFA or
conditional access for automatically created service admin for Office
365 or Google Workspace.

Harmony Email & Collaboration Service admin created for Office 365
is named as checkpoint-service-user, and for Google Workspace as
cloud-sec-av.
You must disable MFA or conditional access to automatically create a
service admin.

For more information, see:


n Office 365 multi-factor authentication
n Google Workspace Set up 2-Step Verification

Security events are not created n Verify that Harmony Email & Collaboration was properly
in the portal authorized with the SaaS application without errors.
After successful authorization, you should see updated
statistics of active users and total files/emails at the bottom of
the Overview page
n The scanned files/email may contain no malicious/phishing
activity and are therefore not presented as security events.
Create custom query for files/emails and inspect the relevant
item for malicious findings.
Recent Emails query:
Analytics > Add new query > Show recent emails
Recent files query:
Analytics > Add new query > Show recent files
n Contact your Check Point representative to report any missed
detections.

Security event is created with a n Verify the specific user is covered by the relevant scope of the
"NEW" state in the portal but configured Inline Prevent rule.
the user receives n Verify that the rule's Suspicious phishing workflow is not
phishing/malicious emails configured to Do nothing.
n For the Monitor only operation mode, it is expected to get only
notifications for any events that happened.
n For the Protect (Inline) operation mode, security events for
users covered by the rule's scope should be created in
REMEDIATED state.
n The user is alerted based on the workflow of the configured
rule.

Harmony Email & Collaboration Administration Guide   |   186


Appendix C: Troubleshooting

Issue Solution

Security events are created for n After initial configuration, the system is "learning" the user's
legitimate emails or files behavior and may produce false detections (called false
positives) during this period. For such cases, manually add an
email exception
n If a security event is created for a legitimate file(s), contact your
Check Point representative or Check Point support to report the
false detection.

Harmony Email & Collaboration Administration Guide   |   187


Check Point Copyright Notice

Check Point Copyright Notice


© 2022 Check Point Software Technologies Ltd.

All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check
Point. While every precaution has been taken in the preparation of this book, Check Point assumes no
responsibility for errors or omissions. This publication and features described herein are subject to change
without notice.

RESTRICTED RIGHTS LEGEND:


Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)
(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR
52.227-19.

TRADEMARKS:
Refer to the Copyright page for a list of our trademarks.
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.

Harmony Email & Collaboration Administration Guide   |   188

You might also like