Serious Discussion Harmony Endpoint by Check Point

Kongo

Level 36
Verified
Top Poster
Well-known
Feb 25, 2017
2,524
What exactly is so important about rollback nowadays. If you get hit by ransomware then you should worry about your data being stolen and not really about your data getting encrypted. Who needs a rollback function if you have a backup solution anyway?

 

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,043
What exactly is so important about rollback nowadays. If you get hit by ransomware then you should worry about your data being stolen and not really about your data getting encrypted. Who needs a rollback function if you have a backup solution anyway?
Backup solution don't require restore/rollback/remediate/recover? Which word you use they all serve the same purpose as they are interchangeably used

That's why all these while I'm trying to point out system rollback is superior than files rollback. Both will require files to be backed up. System backup also involves the system and boot partitions

Ransomware attack is generally to make you pay the ransom. For a mutli-prong ransomware attack early stages might include data stealing, disable your AV/AM, avoid your sandbox etc. The last stage is usually encryption.

If your system can prevent and protect that's fine. If not then rolling back is the final step.
 

HarborFront

Level 71
Verified
Top Poster
Content Creator
Oct 9, 2016
6,043
Last edited:

Trident

Level 28
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
1,763
Ransomware attack is generally to make you pay the ransom. For a mutli-prong ransomware attack early stages might include data stealing, disable your AV/AM, avoid your sandbox etc. The last stage is usually encryption.
You are right. But for Check Point Harmony, the portal is secured with 2FA via authenticator. Attackers will have hard time disabling your AV unless they gain kernel access for example, via bring your own vulnerable driver abuse. That’s not exceptionally easy by itself either. The client is further password-protected if you try to uninstall and they ask you to change the default password. The portal can send out instant email alerts if a client fails to communicate, has components disabled and others.
The compliance blade can automatically isolate a computer from the network when certain conditions are not met, for example, anti-malware is not running or is out-of-date.
In addition, you as admin are supposed to keep an eye on everything at all times. Harmony Endpoint is an EDR.
Audit logs are available so you can have a look what’s going on with the devices and if anybody logged in to the portal.

Harmony also prevents credentials reuse, which is frequently the culprit behind a successful attack.

They can try to evade the sandbox but you can configure the client to block all downloads which are not emulated. For additional protection against targeted attacks (I am talking about businesses here, for home use it is not necessary), Check Point offers Harmony Email or even better, Harmony Email and Collaboration. These products will ensure emails are properly scanned for all signs of malicious intent and attachments, even in password-protected archives are emulated before they get to you.
 

NormanF

Level 8
Verified
Jan 11, 2018
359
Harmony is an EDR that fills in a gap between your AV and your AE/HIPS software.

There's no way to configure the Harmony browser extension to prevent it from blocking a download it has flagged as a FP.

In case you ask, the browser extension isn't removable nor can it be turned off.

The one drawback is Harmony wants to encrypt your hard drive. I had to shut if off in the Infinity Portal.

You get a one year evaluation licence with the product. It doesn't disable Windows Defender or the Windows Firewall.

I found set up after installing it a breeze. It will reboot once installation is finished. The Harmony client is spartan and clear.

It should be noted Harmony doesn't support Smart App so it will have to be disabled prior to installation.
 

Trident

Level 28
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
1,763
Harmony is an EDR that fills in a gap between your AV and your AE/HIPS software.

There's no way to configure the Harmony browser extension to prevent it from blocking a download it has flagged as a FP.
Harmony already includes plenty of AV components. The browser extension has a tick that says “always pin browser extension”. You need to disable that to remove it.
 

NormanF

Level 8
Verified
Jan 11, 2018
359
Harmony already includes plenty of AV components. The browser extension has a tick that says “always pin browser extension”. You need to disable that to remove it.

Its says its managed by my organisation. The extension is Harmony's replacement for your browser download and a file will be allowed only if it matches what's in the cloud database. That will stop malware from even making it into your download folder.

AV is more like a second scanner and it won't replace your primary AV.
 

Trident

Level 28
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
1,763
Its says its managed by my organisation. The extension is Harmony's replacement for your browser download and a file will be allowed only if it matches what's in the cloud database. That will stop malware from even making it into your download folder.

AV is more like a second scanner and it won't replace your primary AV.
Dude they are giving you a choice of 2 AV engines + a proprietary Next-Gen AV and reputation lookups that include feeds from a dozen of vendors. Not sure how this is “more like a second opinion scanner”. The extension has an extremely detailed configuration and can be removed as well.
 

NormanF

Level 8
Verified
Jan 11, 2018
359
Dude they are giving you a choice of 2 AV engines + a proprietary Next-Gen AV and reputation lookups that include feeds from a dozen of vendors. Not sure how this is “more like a second opinion scanner”. The extension has an extremely detailed configuration and can be removed as well.

You're right, I checked and Checkpoint took over malware protection and its Windows Defender that's been relegated to backup scanner duty!
 

NormanF

Level 8
Verified
Jan 11, 2018
359
You are right. But for Check Point Harmony, the portal is secured with 2FA via authenticator. Attackers will have hard time disabling your AV unless they gain kernel access for example, via bring your own vulnerable driver abuse. That’s not exceptionally easy by itself either. The client is further password-protected if you try to uninstall and they ask you to change the default password. The portal can send out instant email alerts if a client fails to communicate, has components disabled and others.
The compliance blade can automatically isolate a computer from the network when certain conditions are not met, for example, anti-malware is not running or is out-of-date.
In addition, you as admin are supposed to keep an eye on everything at all times. Harmony Endpoint is an EDR.
Audit logs are available so you can have a look what’s going on with the devices and if anybody logged in to the portal.

Harmony also prevents credentials reuse, which is frequently the culprit behind a successful attack.

They can try to evade the sandbox but you can configure the client to block all downloads which are not emulated. For additional protection against targeted attacks (I am talking about businesses here, for home use it is not necessary), Check Point offers Harmony Email or even better, Harmony Email and Collaboration. These products will ensure emails are properly scanned for all signs of malicious intent and attachments, even in password-protected archives are emulated before they get to you.

You are right. But for Check Point Harmony, the portal is secured with 2FA via authenticator. Attackers will have hard time disabling your AV unless they gain kernel access for example, via bring your own vulnerable driver abuse. That’s not exceptionally easy by itself either. The client is further password-protected if you try to uninstall and they ask you to change the default password. The portal can send out instant email alerts if a client fails to communicate, has components disabled and others.
The compliance blade can automatically isolate a computer from the network when certain conditions are not met, for example, anti-malware is not running or is out-of-date.
In addition, you as admin are supposed to keep an eye on everything at all times. Harmony Endpoint is an EDR.
Audit logs are available so you can have a look what’s going on with the devices and if anybody logged in to the portal.

Harmony also prevents credentials reuse, which is frequently the culprit behind a successful attack.

They can try to evade the sandbox but you can configure the client to block all downloads which are not emulated. For additional protection against targeted attacks (I am talking about businesses here, for home use it is not necessary), Check Point offers Harmony Email or even better, Harmony Email and Collaboration. These products will ensure emails are properly scanned for all signs of malicious intent and attachments, even in password-protected archives are emulated before they get to you.

The client lists something called capsule docs. What are they? Thanks!
 

Sandbox Breaker

Level 9
Verified
Well-known
Jan 6, 2022
436
Dude they are giving you a choice of 2 AV engines + a proprietary Next-Gen AV and reputation lookups that include feeds from a dozen of vendors. Not sure how this is “more like a second opinion scanner”. The extension has an extremely detailed configuration and can be removed as well.
Which vendors? Got me interested.
 
  • Like
Reactions: Dave Russo

Trident

Level 28
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
1,763
Which vendors? Got me interested.
The biggest feed provider is Kaspersky (McAfee for their business products is subscribed to Kaspersky too), second biggest is Cisco Talos (many vendors are subscribed to Cisco). Many other vendors supply certain sort of feeds, like Avast for example supplies code signatures blacklist. Other vendors provide spam emails. It’s a lot of external data in ThreatCloud.
 

NormanF

Level 8
Verified
Jan 11, 2018
359
The biggest feed provider is Kaspersky (McAfee for their business products is subscribed to Kaspersky too), second biggest is Cisco Talos (many vendors are subscribed to Cisco). Many other vendors supply certain sort of feeds, like Avast for example supplies code signatures blacklist. Other vendors provide spam emails. It’s a lot of external data in ThreatCloud.
Speaking of the Capsule Docs module, where is it on the Infinity Portal? Thanks!
 

Trident

Level 28
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
1,763
Speaking of the Capsule Docs module, where is it on the Infinity Portal? Thanks!
The capsule docs service is available after you create a user centre account.
The whole managment and all necessary clients/viewers are available on documentsecurity.checkpoint.com

You will need to log-in with your UC account.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top