Skip to main content

Check Point Harmony

Check Point Harmony is BYU’s new email security solution. It automatically protects against sophisticated email attacks such as phishing and malware while enabling end-users to easily block graymail and spam. Check Point Harmony is a powerful tool that protects your mailbox and helps Brigham Young University protect its sensitive data.

CHECKPOINT HARMONY STATS
In a single week, Checkpoint Harmony inspected 2.2 Million BYU emails.
  • 664.9K were identified as Graymail
  • 57.4K were identified as spam
  • 26K were identified as phishing attacks
  • 3 contained dangerous Malware

What is graymail, SPAM, phishing, and malware?

data-content-type=""
Graymail

GRAYMAIL

Bulk email that a user initially agreed to receive but no longer wants to receive it. (Routed to junk folder)

overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= promoTextAlignment=
data-content-type=""
Spam

SPAM

Bulk email that a user did not agree to receive and does not want it. (Routed to junk folder)
overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= promoTextAlignment=
data-content-type=""

PHISHING

Fraudulent email that appears to come from a legitimate source, but strives to trick the recipient into giving away sensitive information such as passwords or bank account numbers. (Routed to quarantine)
overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= promoTextAlignment=
data-content-type=""
Malware

MALWARE

Malicious software that is disguised as an attachment or link within an email. It infects an end-user’s computer and strives to spread it throughout an organization to steal sensitive data or cause harm in some way. (Routed to quarantine)
overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= promoTextAlignment=
overrideBackgroundColorOrImage= overrideTextColor= promoTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText=

VIDEO: How to use Checkpoint Harmony

Check Point User Training

VIDEO: How to Report Unwanted and/or Suspicious Email

How to Report an Email

Frequently Asked Questions

  • If you use Outlook to manage your emails, use the report tool found in the tool ribbon. This tool may also be found in the ellipsis (3 dots) drop down menu found in the upper right hand corner of an email message window. If using an email management app other than Outlook, forward the email as an attachment to phishing@byu.edu.

  • Go to https://email-security-portal.checkpoint.com

    1. Select "Sign in with Microsoft", and use your NetID@byu.edu credentials.
    2. Follow any multi-factor authentication steps it directs you to do, and then you should have access your personal quarantine portal.
  • You may release emails from within your personal email security portal. Review the email list, and select the email you wish to release. Check Point Harmony will remember your selection and update your filtering preferences automatically.

  • If an email is suspected as being a high risk threat, then it will need to be reviewed by the CES Security Operations Center first. From within the email security portal, request that the email be reviewed, and if it is found to be safe, it will be released to your mailbox within 24 hours.

  • Users can generate their own quarantine reports on-demand whenever they wish by clicking the "Generate a new quarantine report of the last 24 hours" link at the bottom of each quarantine email. There currently is no feature for users to customize the frequency of automated reports. A feature request has been submitted to Check Point, and end-users will be notified when they can customize this setting. Until then, end-users will receive this report every 24 hours.

  • Wait 30 minutes after the time the email was sent. If it does not appear in your mailbox, junk folder, or within the email security portal, then please call BYU Support.

  • If you suspect your email account has been compromised, please call the CES Security Operations Center 801-422-7788 immediately, and they will guide you through the steps of remediating your account.