Harmony Mobile leverages Check Point’s ThreatCloud and award-winning file protection capabilities to block the download of malicious files to mobile devices and prevent file-based cyber-attacks on organizations.
This course includes these modules:
Course Introduction
Introduction to Harmony Mobile
Harmony Mobile architecture
Harmony Mobile deployment - with UEM (part1)
Harmony Mobile deployment - with UEM (part2)
Harmony Mobile direct deployment
Harmony Mobile Security Policy configuration
Harmony Mobile dashboard and forensics
Adding HM into Mobile Intune
Configure HM in Intune for IOS
Configure HM in Intune for Android
Adding compliance policies for the groups
Creating Groups for HM
Zero touch deployment for Android devices
Zero touch deployment for IOS devices Adding HM certification into Intune