Skip to content

Commit 6c576c0

Browse files
author
Angela Fleischmann
authored
Merge pull request #7398 from Brenduns/14179205-mtd-sandblast-now-harmony-mobile
Edits to change Sandblast to Harmony for Check Point Mobile Threat Pr…
2 parents c7aa561 + b1399fd commit 6c576c0

29 files changed

Lines changed: 103 additions & 103 deletions

memdocs/intune/protect/checkpoint-sandblast-mobile-mobile-threat-defense-connector.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Set up Check Point SandBlast MTD connector with Intune
4+
title: Set up Check Point Harmony Mobile MTD connector with Intune
55
titleSuffix: Microsoft Intune
6-
description: Learn about integrating Intune with Check Point SandBlast Mobile Threat Defense to control mobile device access to your corporate resources.
6+
description: Learn about integrating Intune with Check Point Harmony Mobile Threat Defense to control mobile device access to your corporate resources.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 03/09/2020
11+
ms.date: 04/19/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -29,11 +29,11 @@ ms.custom: intune-azure; seodec18
2929
ms.collection: M365-identity-device-management
3030
---
3131

32-
# Check Point SandBlast Mobile Threat Defense connector with Intune
32+
# Check Point Harmony Mobile Threat Defense connector with Intune
3333

34-
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point SandBlast Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Check Point SandBlast Mobile app.
34+
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point Harmony Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Harmony Mobile Protect app.
3535

36-
You can configure Conditional Access policies based on Check Point SandBlast Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
36+
You can configure Conditional Access policies based on Check Point Harmony Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
3737

3838
> [!NOTE]
3939
> This Mobile Threat Defense vendor is not supported for unenrolled devices.
@@ -50,14 +50,14 @@ You can configure Conditional Access policies based on Check Point SandBlast Mob
5050

5151
- Microsoft Intune subscription
5252

53-
- Check Point SandBlast Mobile Threat Defense subscription
54-
- See [CheckPoint SandBlast website](https://www.checkpoint.com/) for more information.
53+
- Check Point Harmony Mobile Threat Defense subscription
54+
- See the [CheckPoint Harmony website](https://www.checkpoint.com/harmony).
5555

56-
## How do Intune and Check Point SandBlast Mobile help protect your company resources?
56+
## How do Intune and Check Point Harmony Mobile help protect your company resources?
5757

58-
Check Point Sandblast Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point SandBlast cloud service to assess the device's risk for mobile threats.
58+
Check Point Harmony Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point Harmony cloud service to assess the device's risk for mobile threats.
5959

60-
The Intune device compliance policy includes a rule for Check Point SandBlast Mobile Threat Defense, which is based on the Check Point SandBlast risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Check Point SandBlast mobile app installed in their devices to resolve the issue and regain access to corporate resources.
60+
The Intune device compliance policy includes a rule for Check Point Harmony Mobile Threat Defense, which is based on the Check Point Harmony risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Harmony Mobile Protect app installed in their devices to resolve the issue and regain access to corporate resources.
6161

6262
Here are some common scenarios:
6363

@@ -74,12 +74,12 @@ When malicious apps such as malware are detected on devices, you can block devic
7474
*Block when malicious apps are detected:*
7575

7676
> [!div class="mx-imgBorder"]
77-
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
77+
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
7878
7979
*Access granted on remediation:*
8080

8181
> [!div class="mx-imgBorder"]
82-
> ![Check Point MTD access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
82+
> ![Check Point MTD access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
8383
8484
### Control access based on threat to network
8585

@@ -88,12 +88,12 @@ Detect threats like **Man-in-the-middle** in network, and protect access to Wi-F
8888
*Block network access through Wi-Fi:*
8989

9090
> [!div class="mx-imgBorder"]
91-
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
91+
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
9292
9393
*Access granted on remediation:*
9494

9595
> [!div class="mx-imgBorder"]
96-
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
96+
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
9797
9898
### Control access to SharePoint Online based on threat to network
9999

@@ -102,30 +102,30 @@ Detect threats like **Man-in-the-middle** in network, and prevent synchronizatio
102102
*Block SharePoint Online when network threats are detected:*
103103

104104
> [!div class="mx-imgBorder"]
105-
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
105+
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
106106
107107
*Access granted on remediation:*
108108

109109
> [!div class="mx-imgBorder"]
110-
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
110+
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
111111
112112
### Control access on unenrolled devices based on threats from malicious apps
113113

114-
When the Check Point Sandblast Mobile Threat Defense solution considers a device to be infected:
114+
When the Check Point Harmony Mobile Threat Defense solution considers a device to be infected:
115115
> [!div class="mx-imgBorder"]
116-
> ![App protection policy blocks due to detected malware](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/sandblast-app-policy-block.png)
116+
> ![App protection policy blocks due to detected malware](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png)
117117
118118
Access is granted on remediation:
119119

120120
> [!div class="mx-imgBorder"]
121-
> ![Access is granted on remediation for App protection policy](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/sandblast-app-policy-remediated.png)
121+
> ![Access is granted on remediation for App protection policy](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png)
122122
123123
## Next steps
124124

125-
- [Integrate CheckPoint SandBlast with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
125+
- [Integrate Check Point Harmony Mobile with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
126126

127-
- [Set up CheckPoint SandBlast Mobile app](mtd-apps-ios-app-configuration-policy-add-assign.md)
127+
- [Set up Harmony Mobile Protect app](mtd-apps-ios-app-configuration-policy-add-assign.md)
128128

129-
- [Create CheckPoint SandBlast Mobile device compliance policy](mtd-device-compliance-policy-create.md)
129+
- [Create Check Point Harmony Mobile device compliance policy](mtd-device-compliance-policy-create.md)
130130

131-
- [Enable CheckPoint SandBlast Mobile MTD connector](mtd-connector-enable.md)
131+
- [Enable Check Point Harmony Mobile MTD connector](mtd-connector-enable.md)
Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
# required metadata
33

4-
title: Integrate Check Point SandBlast MTD with Intune
4+
title: Integrate Check Point Harmony MTD with Intune
55

66
titleSuffix: Microsoft Intune
7-
description: How to set up CheckPoint SandBlast Mobile Threat Defense (MTD) with Intune to control mobile device access to your corporate resources.
7+
description: How to set up CheckPoint Harmony Mobile Threat Defense (MTD) with Intune to control mobile device access to your corporate resources.
88
keywords:
99
author: brenduns
1010
ms.author: brenduns
1111
manager: dougeby
12-
ms.date: 10/21/2019
12+
ms.date: 04/19/2022
1313
ms.topic: how-to
1414
ms.service: microsoft-intune
1515
ms.subservice: protect
@@ -30,18 +30,18 @@ ms.custom: intune-azure; seodec18
3030
ms.collection: M365-identity-device-management
3131
---
3232

33-
# Integrate Check Point SandBlast Mobile with Intune
33+
# Integrate Check Point Harmony Mobile with Intune
3434

35-
Complete the following steps to integrate the Check Point SandBlast Mobile Threat Defense solution with Intune.
35+
Complete the following steps to integrate the Check Point Harmony Mobile Threat Defense solution with Intune.
3636

3737
> [!NOTE]
3838
> This Mobile Threat Defense vendor is not supported for unenrolled devices.
3939
4040
## Before you begin
4141

42-
The instructions in this article are done in the [Check Point SandBlast Mobile console](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Gh1u).
42+
The instructions in this article are done in the [Check Point Harmony Mobile console](https://portal.checkpoint.com).
4343

44-
Before starting the process of integrating Check Point SandBlast Mobile with Intune, make sure you have the following:
44+
Before starting the process of integrating Check Point Harmony Mobile with Intune, make sure you've the following configurations:
4545

4646
- Microsoft Intune subscription
4747

@@ -55,43 +55,43 @@ Before starting the process of integrating Check Point SandBlast Mobile with Int
5555

5656
- Send device information to Intune
5757

58-
- Admin credentials to access Check Point SandBlast Mobile MTD console.
58+
- Admin credentials to access Check Point Harmony Mobile MTD console.
5959

60-
### Check Point SandBlast app authorization
60+
### Harmony Mobile Protect app authorization
6161

62-
The Check Point SandBlast app authorization process consists of the following:
62+
The Harmony Mobile Protect app authorization process consists of the following steps:
6363

64-
- Allow the Check Point SandBlast Mobile service to communicate information related to device health state back to Intune.
64+
- Allow the Check Point Harmony Mobile service to communicate information related to device health state back to Intune.
6565

66-
- CheckPoint SandBlast Mobile syncs with Azure AD Enrollment Group membership to populate its device's database.
66+
- CheckPoint Harmony Mobile syncs with Azure AD Enrollment Group membership to populate its device's database.
6767

68-
- Allow Check Point SandBlast admin console to use Azure AD Single Sign On (SSO).
68+
- Allow Check Point Harmony admin console to use Azure AD Single Sign On (SSO).
6969

70-
- Allow the Check Point SandBlast Mobile app to sign in using Azure AD SSO.
70+
- Allow the Harmony Mobile Protect app to sign in using Azure AD SSO.
7171

72-
## To set up Check Point SandBlast Mobile integration
72+
## To set up Check Point Harmony Mobile integration
7373

74-
1. Go to [Check Point SandBlast Mobile MTD console](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Gh1u) and sign in with your credentials.
74+
1. Go to [Check Point Harmony Mobile MTD console](https://portal.checkpoint.com) and sign in with your credentials.
7575

76-
2. Click on the **Settings** tab.
76+
2. Select on the **Settings** tab.
7777

7878
3. Choose **Device management**, then **Settings**.
7979

8080
4. Choose **Microsoft Intune** from the **MDM Service** drop-down list.
8181

82-
5. Once you set Microsoft Intune as the MDM Service, the **Microsoft Intune Configuration** window pops up, choose the **Add to my organization** for each device platform: iOS/iPadOS, Android and Windows to authorize Check Point SandBlast Mobile to communicate with Intune and Azure AD.
82+
5. Once you set Microsoft Intune as the MDM Service, the **Microsoft Intune Configuration** window pops up, choose the **Add to my organization** for each device platform: iOS/iPadOS, Android and Windows to authorize Harmony Mobile Protect to communicate with Intune and Azure AD.
8383

84-
![Image showing Check Point MTD Intune configuration](./media/checkpoint-sandblast-mobile-mtd-connector-integration/checkpoint-MTD-1.PNG)
84+
![Image showing Check Point MTD Intune configuration](./media/checkpoint-harmony-mobile-mtd-connector-integration/checkpoint-mtd-1.png)
8585

8686
> [!IMPORTANT]
8787
> You must add all device platforms to proceed to the next step.
8888
89-
6. Choose **Accept** to authorize the Check Point SandBlast Mobile app to communicate with Intune and Azure Active Directory.
89+
6. Choose **Accept** to authorize the Harmony Mobile Protect app to communicate with Intune and Azure Active Directory.
9090

9191
7. Once you enabled all device platforms, you need to enter the Azure AD security group.
9292

9393
8. Choose **Verify**, once the Azure AD security group is successfully verified, choose **Save**.
9494

9595
## Next steps
9696

97-
- [Set up Check Point SandBlast Mobile apps](mtd-apps-ios-app-configuration-policy-add-assign.md)
97+
- [Set up Harmony Mobile Protect apps](mtd-apps-ios-app-configuration-policy-add-assign.md)
37.6 KB
Loading
34.8 KB
Loading
35.6 KB
Loading
38.3 KB
Loading
37.7 KB
Loading
35.6 KB
Loading
54.5 KB
Loading
56.3 KB
Loading

0 commit comments

Comments
 (0)