<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Granular Policies in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/Granular-Policies/m-p/41852#M245</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As of February 3, 2019, Administrators of SandBlast Mobile&amp;nbsp;can now&amp;nbsp;set Granular Policies. These policies can be assigned to specific users, specific groups, or all users.&lt;/P&gt;&lt;P&gt;Granular Policies will allow you&amp;nbsp;to configure policies for different groups of users, such as enforcing stricter security control for executives.&lt;/P&gt;&lt;P&gt;When this capability is released, the current policies you have configured for Device, Application, Network Protection, Wi-Fi Network Protection, and Cellular Network Protection will be moved to the Global rulebase so that you and your users will not have policy enforcement interruptions during the&amp;nbsp;roll-out.&amp;nbsp;&lt;/P&gt;&lt;H1&gt;New Policy tab&lt;/H1&gt;&lt;P&gt;Navigating to the Policy tab, you are presented with a rulebase list that has the default Global policy profile&amp;nbsp;already listed.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75189" class="image-7 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75189_pastedImage_92.png" /&gt;&lt;/P&gt;&lt;H2&gt;Rulebase&lt;/H2&gt;&lt;P&gt;When you first navigate to the Policy tab, you are presented with a rulebase list that has the default Global policy&amp;nbsp;profile already listed.&lt;/P&gt;&lt;P&gt;As you add new policy profiles for different groups/users, you will add them to the rulebase to assign them to the&amp;nbsp;appropriate groups/users.&lt;/P&gt;&lt;P&gt;This list is processed in order from 1, 2, 3, etc. until a user or group match for the user&amp;nbsp;is made, then that policy is applied to the user.&lt;/P&gt;&lt;P&gt;So the more granular the policy, the higher in the list it should be listed with the Global policy being at the bottom&amp;nbsp;of the list.&lt;/P&gt;&lt;P&gt;To add a policy to the rulebase, click "Add Rule".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75191" class="j-img-floatstart image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75191_pastedImage_105.png" /&gt;&lt;/P&gt;&lt;P&gt;A line will be added to the top of the rulebase list.&lt;/P&gt;&lt;P&gt;Enter in a Rule Name, select the users or groups from the drop-down list, select the policy profile from the drop-down list, and enter in a comment.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75192" alt="" class="j-img-floatstart image-10 jive-image j-img-original" src="/legacyfs/online/checkpoint/75192_Rulebase Add Rule_1.png" /&gt;&lt;/P&gt;&lt;P&gt;Click the checkmark at the end of the rule.&lt;/P&gt;&lt;P&gt;When you are done adding all of policies to the rulebase, click "Save".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75193" class="image-11 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75193_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;H2&gt;Policy Profiles&lt;/H2&gt;&lt;P&gt;You can edit the Global policy profile&amp;nbsp;as this is the default policy for all devices.&lt;/P&gt;&lt;P&gt;You create a new policy profile by clicking on the "+".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75180" class="j-img-floatstart image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75180_pastedImage_31.png" /&gt;&lt;/P&gt;&lt;P&gt;Give the policy a unique name and a description.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75190" class="j-img-floatstart jive-image image-8" height="147" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75190_pastedImage_99.png" width="330" /&gt;&lt;/P&gt;&lt;P&gt;Click "OK".&lt;BR /&gt;After you click OK, you are taken to the profile editing view. You can always edit a profile by selecting it from the&amp;nbsp;Policy Profiles list.&lt;/P&gt;&lt;H3&gt;Device Policies&lt;/H3&gt;&lt;P&gt;On the Device tab, you can configure general, Android, and iOS specific policies, such as when a device is&amp;nbsp;marked "inactive" if it hasn't communicated with the SandBlast Mobile Dashboard for a set number of days, or&amp;nbsp;raising the risk level of a device running an OS version below Android 6.0.&lt;/P&gt;&lt;P&gt;This is also the place to whitelist proxy server IP addresses.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75181" class="j-img-floatstart image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75181_pastedImage_35.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "Save" to save policy changes.&lt;/P&gt;&lt;H3&gt;Application Policies&lt;/H3&gt;&lt;P&gt;On the Application tab, you can configure the risk level associated with different application classifications.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75185" class="image-3 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75185_pastedImage_37.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "Save" to save policy changes.&lt;/P&gt;&lt;H3&gt;On-device Network Protection Policies&lt;/H3&gt;&lt;P&gt;On-device Network Protection enhances SandBlast Mobile's advanced mobile threat protection and establishes&amp;nbsp;a new mobile security paradigm to prevent emerging Gen V network attacks.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75186" class="j-img-floatstart jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75186_pastedImage_51.png" /&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;The configuration of Network Protection policies is the same as covered in these articles:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2903-introducing-on-device-network-protection-odnp"&gt;Introducing On-device Network Protection (ONP)&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2904-new-capability-for-odnp-anti-phishing"&gt;New Capability for ONP: Anti-Phishing&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2905-new-capability-for-odnp-safe-browsing"&gt;New Capability for ONP: Safe Browsing&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2908-new-capability-for-odnp-conditional-access"&gt;New Capability for ONP: Conditional Access&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2906-new-capability-for-odnp-anti-bot"&gt;New Capability for ONP: Anti-Bot&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2907-new-capability-for-odnp-url-filtering"&gt;New Capability for ONP: URL Filtering&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Wi-Fi Network Policies&lt;/H3&gt;&lt;P&gt;On the WiFi Network tab, you can set the risk level for Wi-Fi Network Protection settings, add additional servers to be used for MitM detection, enable Geolocation collection, and upload SSL certificates you wish to whitelist.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75187" class="j-img-floatstart image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75187_pastedImage_61.png" /&gt;&lt;/P&gt;&lt;H4&gt;Enable Geo Location&lt;/H4&gt;&lt;P&gt;This only enables it from the Dashboard side; the user must still enable the SandBlast Mobile Protect app to use Location on their device in order for Geo Location information to be gathered.&lt;/P&gt;&lt;P&gt;This information is used to provide map detail on the Network tab.&lt;/P&gt;&lt;H4&gt;Whitelisting Corporate Certificates&lt;/H4&gt;&lt;P&gt;When checking for SSL interception attacks (SSL Bumping), the Solution checks if the destination site’s SSL certificate is the one expected. If it is not, the Solution alerts that there may be an attack, even if the received certificate is in the root CA list of the device.&lt;/P&gt;&lt;P&gt;However, many organizations inspect employee traffic and to the Solution it appears that this is indeed an advanced SSL interception attack because:&lt;/P&gt;&lt;P&gt;The organization requires the organization’s certificate be installed on the device as a root CA&lt;/P&gt;&lt;P&gt;The SSL interception of the traffic in an organizational proxy&lt;/P&gt;&lt;P&gt;In order to avoid alerting on the organization’s own certificate, the organization can whitelist its own certificates through this screen. This way the Solution will not alert an "attack" involving these certificates.&lt;/P&gt;&lt;H3&gt;Cellular Network Policies&lt;/H3&gt;&lt;P&gt;On the Cellular Network tab, you can enable/disable SMS phishing detection/protection.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75188" class="j-img-floatstart image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75188_pastedImage_68.png" /&gt;&lt;/P&gt;&lt;H2 style="text-align: justify;"&gt;Adding a Device Group&lt;/H2&gt;&lt;P&gt;Navigating to Devices, click "ADD" at the bottom of the Groups list.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75194" class="j-img-floatstart image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75194_pastedImage_19.png" /&gt;&lt;/P&gt;&lt;P&gt;In the pop-up window, enter in a group name.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75195" class="j-img-floatstart image-13 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75195_pastedImage_25.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "ADD".&lt;BR /&gt;When adding devices, you can assign them to their appropriate groups.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NOTE: When integrating with a Device Management platform, the devices and device groups are imported from that platform. And "Add new device" and "Add" groups are disabled.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Nov 2018 23:25:52 GMT</pubDate>
    <dc:creator>Pamela_S__Lee</dc:creator>
    <dc:date>2018-11-27T23:25:52Z</dc:date>
    <item>
      <title>Granular Policies</title>
      <link>https://community.checkpoint.com/t5/Mobile/Granular-Policies/m-p/41852#M245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As of February 3, 2019, Administrators of SandBlast Mobile&amp;nbsp;can now&amp;nbsp;set Granular Policies. These policies can be assigned to specific users, specific groups, or all users.&lt;/P&gt;&lt;P&gt;Granular Policies will allow you&amp;nbsp;to configure policies for different groups of users, such as enforcing stricter security control for executives.&lt;/P&gt;&lt;P&gt;When this capability is released, the current policies you have configured for Device, Application, Network Protection, Wi-Fi Network Protection, and Cellular Network Protection will be moved to the Global rulebase so that you and your users will not have policy enforcement interruptions during the&amp;nbsp;roll-out.&amp;nbsp;&lt;/P&gt;&lt;H1&gt;New Policy tab&lt;/H1&gt;&lt;P&gt;Navigating to the Policy tab, you are presented with a rulebase list that has the default Global policy profile&amp;nbsp;already listed.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75189" class="image-7 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75189_pastedImage_92.png" /&gt;&lt;/P&gt;&lt;H2&gt;Rulebase&lt;/H2&gt;&lt;P&gt;When you first navigate to the Policy tab, you are presented with a rulebase list that has the default Global policy&amp;nbsp;profile already listed.&lt;/P&gt;&lt;P&gt;As you add new policy profiles for different groups/users, you will add them to the rulebase to assign them to the&amp;nbsp;appropriate groups/users.&lt;/P&gt;&lt;P&gt;This list is processed in order from 1, 2, 3, etc. until a user or group match for the user&amp;nbsp;is made, then that policy is applied to the user.&lt;/P&gt;&lt;P&gt;So the more granular the policy, the higher in the list it should be listed with the Global policy being at the bottom&amp;nbsp;of the list.&lt;/P&gt;&lt;P&gt;To add a policy to the rulebase, click "Add Rule".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75191" class="j-img-floatstart image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75191_pastedImage_105.png" /&gt;&lt;/P&gt;&lt;P&gt;A line will be added to the top of the rulebase list.&lt;/P&gt;&lt;P&gt;Enter in a Rule Name, select the users or groups from the drop-down list, select the policy profile from the drop-down list, and enter in a comment.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75192" alt="" class="j-img-floatstart image-10 jive-image j-img-original" src="/legacyfs/online/checkpoint/75192_Rulebase Add Rule_1.png" /&gt;&lt;/P&gt;&lt;P&gt;Click the checkmark at the end of the rule.&lt;/P&gt;&lt;P&gt;When you are done adding all of policies to the rulebase, click "Save".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75193" class="image-11 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75193_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;H2&gt;Policy Profiles&lt;/H2&gt;&lt;P&gt;You can edit the Global policy profile&amp;nbsp;as this is the default policy for all devices.&lt;/P&gt;&lt;P&gt;You create a new policy profile by clicking on the "+".&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75180" class="j-img-floatstart image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75180_pastedImage_31.png" /&gt;&lt;/P&gt;&lt;P&gt;Give the policy a unique name and a description.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75190" class="j-img-floatstart jive-image image-8" height="147" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75190_pastedImage_99.png" width="330" /&gt;&lt;/P&gt;&lt;P&gt;Click "OK".&lt;BR /&gt;After you click OK, you are taken to the profile editing view. You can always edit a profile by selecting it from the&amp;nbsp;Policy Profiles list.&lt;/P&gt;&lt;H3&gt;Device Policies&lt;/H3&gt;&lt;P&gt;On the Device tab, you can configure general, Android, and iOS specific policies, such as when a device is&amp;nbsp;marked "inactive" if it hasn't communicated with the SandBlast Mobile Dashboard for a set number of days, or&amp;nbsp;raising the risk level of a device running an OS version below Android 6.0.&lt;/P&gt;&lt;P&gt;This is also the place to whitelist proxy server IP addresses.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75181" class="j-img-floatstart image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75181_pastedImage_35.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "Save" to save policy changes.&lt;/P&gt;&lt;H3&gt;Application Policies&lt;/H3&gt;&lt;P&gt;On the Application tab, you can configure the risk level associated with different application classifications.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75185" class="image-3 j-img-floatstart jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75185_pastedImage_37.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "Save" to save policy changes.&lt;/P&gt;&lt;H3&gt;On-device Network Protection Policies&lt;/H3&gt;&lt;P&gt;On-device Network Protection enhances SandBlast Mobile's advanced mobile threat protection and establishes&amp;nbsp;a new mobile security paradigm to prevent emerging Gen V network attacks.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75186" class="j-img-floatstart jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75186_pastedImage_51.png" /&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;The configuration of Network Protection policies is the same as covered in these articles:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2903-introducing-on-device-network-protection-odnp"&gt;Introducing On-device Network Protection (ONP)&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2904-new-capability-for-odnp-anti-phishing"&gt;New Capability for ONP: Anti-Phishing&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2905-new-capability-for-odnp-safe-browsing"&gt;New Capability for ONP: Safe Browsing&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2908-new-capability-for-odnp-conditional-access"&gt;New Capability for ONP: Conditional Access&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2906-new-capability-for-odnp-anti-bot"&gt;New Capability for ONP: Anti-Bot&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2907-new-capability-for-odnp-url-filtering"&gt;New Capability for ONP: URL Filtering&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Wi-Fi Network Policies&lt;/H3&gt;&lt;P&gt;On the WiFi Network tab, you can set the risk level for Wi-Fi Network Protection settings, add additional servers to be used for MitM detection, enable Geolocation collection, and upload SSL certificates you wish to whitelist.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75187" class="j-img-floatstart image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75187_pastedImage_61.png" /&gt;&lt;/P&gt;&lt;H4&gt;Enable Geo Location&lt;/H4&gt;&lt;P&gt;This only enables it from the Dashboard side; the user must still enable the SandBlast Mobile Protect app to use Location on their device in order for Geo Location information to be gathered.&lt;/P&gt;&lt;P&gt;This information is used to provide map detail on the Network tab.&lt;/P&gt;&lt;H4&gt;Whitelisting Corporate Certificates&lt;/H4&gt;&lt;P&gt;When checking for SSL interception attacks (SSL Bumping), the Solution checks if the destination site’s SSL certificate is the one expected. If it is not, the Solution alerts that there may be an attack, even if the received certificate is in the root CA list of the device.&lt;/P&gt;&lt;P&gt;However, many organizations inspect employee traffic and to the Solution it appears that this is indeed an advanced SSL interception attack because:&lt;/P&gt;&lt;P&gt;The organization requires the organization’s certificate be installed on the device as a root CA&lt;/P&gt;&lt;P&gt;The SSL interception of the traffic in an organizational proxy&lt;/P&gt;&lt;P&gt;In order to avoid alerting on the organization’s own certificate, the organization can whitelist its own certificates through this screen. This way the Solution will not alert an "attack" involving these certificates.&lt;/P&gt;&lt;H3&gt;Cellular Network Policies&lt;/H3&gt;&lt;P&gt;On the Cellular Network tab, you can enable/disable SMS phishing detection/protection.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75188" class="j-img-floatstart image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75188_pastedImage_68.png" /&gt;&lt;/P&gt;&lt;H2 style="text-align: justify;"&gt;Adding a Device Group&lt;/H2&gt;&lt;P&gt;Navigating to Devices, click "ADD" at the bottom of the Groups list.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75194" class="j-img-floatstart image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75194_pastedImage_19.png" /&gt;&lt;/P&gt;&lt;P&gt;In the pop-up window, enter in a group name.&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;IMG __jive_id="75195" class="j-img-floatstart image-13 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75195_pastedImage_25.png" /&gt;&lt;/P&gt;&lt;P&gt;Click "ADD".&lt;BR /&gt;When adding devices, you can assign them to their appropriate groups.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NOTE: When integrating with a Device Management platform, the devices and device groups are imported from that platform. And "Add new device" and "Add" groups are disabled.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2018 23:25:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/Granular-Policies/m-p/41852#M245</guid>
      <dc:creator>Pamela_S__Lee</dc:creator>
      <dc:date>2018-11-27T23:25:52Z</dc:date>
    </item>
  </channel>
</rss>

