Serious Discussion Harmony Endpoint by Check Point

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,923
if I can get too it, I'd like to use harmony most likely.
Shouldnt be a issue with specs, and having a good antivirus, is probably nice. If anything, I can use the free trial and see how I like it.
You can try the zonealarm beta as well after the trial as the beta program is free to use
 
  • +Reputation
Reactions: Trident

Cosmic1764

Level 1
Apr 22, 2024
12
@Trident
Harmony’s BB seems to be effective, but does it actually consistently prevent malware from damaging or exfiltrating data? Some of the reports I’ve seen consist of possible damage done - woukd other security solutions have the same issue?
 
  • Like
Reactions: Trident

Nikos751

Level 20
Verified
Malware Tester
Feb 1, 2013
977
88.70 was just released, and it has significant performance improvements. The recommended endpoint version though, is 88.62 (just changed from 88.320. For any of the late versions, a configuration setting in Policy Capabilities, is the Low Memory Mode in Behavioral Protection which reduces ram usage with little compromise to security.

Low Memory Mode for Behavioral Guard significantly reduces memory utilization by retaining only the most recently matched signatures. There is some reduction in the detection rate but this still remains high. This mode should primarily be considered for utilization in low memory environments. Available from Endpoint Client version E87.30
 

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,357
@Trident
Harmony’s BB seems to be effective, but does it actually consistently prevent malware from damaging or exfiltrating data? Some of the reports I’ve seen consist of possible damage done - woukd other security solutions have the same issue?
Hi @Cosmic1764,

The Harmony Endpoint Behavioural Guard like many other behavioural-based analysis systems, applies virtualisation around the full process chain, as soon as the “dodgy behaviour” has been spotted. This doesn’t happen with all signatures, it happens with some signatures and profiles that are marked as “Audit”.

Behavioural Guard has several other types of signatures and profiles, both local and offline. Some of them simply terminate the process as soon as possible, others terminate and clean.

Having damage done by actively running malware though is nothing new and to be edpected! Not only with HEP, but with any other security software.

For this reason, other components, like the emulation, should be configured to run properly.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top