Serious Discussion Harmony Endpoint by Check Point

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Interesting. And for their sandbox?(You mentioned BitDefender, what else?)
For their emulation they use a host of proprietary engines such as CADET on executables, neural networks, deep learning, CPU-level detection and Intel TDT, static deobfuscators including one for macros and scripts, yara signatures on file and process memory, proprietary anti-malware signatures, Mitre-based and behavioural analysis. And then it uses Kaspersky feeds and Bitdefender as well.
In the end Malware DNA is used to identify the malware family.
 
Last edited:

NormanF

Level 9
Verified
Jan 11, 2018
404
For their emulation they use a host of proprietary engines such as CADET on executables, neural networks, deep learning, CPU-level detection and Intel TDT, static deobfuscators including one for macros and scripts, yara signatures on file and process memory, proprietary anti-malware signatures, Mitre-based and behavioural analysis. And then it uses Kaspersky feeds and Bitdefender as well.
In the end Malware DNA is used to identify the malware family.

All this would work even without the malware module installed on the client?
 

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
All this would work even without the malware module installed on the client?
Yes and if behavioural guard and forensics are installed, they support third-party anti-malware like Microsoft Defender, SEP, Webroot, TM, McAfee and others. When the third-party solution detects malware, it will trigger forensic analysis and you will get forensic report plus the attack will be remediated in accordance with the set policy. But by running Defender you are slowing your system down, having 2 solutions monitoring behaviour and recording activities. Not sure why anyone would want to run Microsoft garbage 😂
 

NormanF

Level 9
Verified
Jan 11, 2018
404
Yes and if behavioural guard and forensics are installed, they support third-party anti-malware like Microsoft Defender, SEP, Webroot, TM, McAfee and others. When the third-party solution detects malware, it will trigger forensic analysis and you will get forensic report plus the attack will be remediated in accordance with the set policy. But by running Defender you are slowing your system down, having 2 solutions monitoring behaviour and recording activities. Not sure why anyone would want to run Microsoft garbage 😂

Microsoft Defender can be strengthened with Defender UI Pro that provides a basic version of VoodooShield. :)
 

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
@Trident did a quick test and I have a question. Is it possible to clear the logs? Basically like a fresh start.
The logs on Infinity Portal can’t be deleted. For the local logs there was a tool but I need to find it within the folders again. The quarantine can be emptied by deleting everything under anti-malware and others.
 
  • Like
Reactions: simmerskool

simmerskool

Level 37
Verified
Top Poster
Well-known
Apr 16, 2017
2,610
Harmony manuals. I downloaded both harmony admin manual pdf & infinity portal manual. Since everything is controlled by portal, should I start reading that first, or the admin first, or read them essentially at the same time flip flopping back and forth. :unsure::unsure:
 
  • Like
Reactions: Trident

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Harmony manuals. I downloaded both harmony admin manual pdf & infinity portal manual. Since everything is controlled by portal, should I start reading that first, or the admin first, or read them essentially at the same time flip flopping back and forth. :unsure::unsure:
I believe you should first read the Infinity Portal manual as this is the heart and the soul of the product. It will get you acquainted with the structure of the portal. This guide is an absolute must. After that you must read the full admin guide. I read it 5-6 times myself (for some reason I love reading guides when I am bored even before I’ve purchased a product). The guide is available offline as well as of 87.30 by pressing on the question mark in the client. There are demos there as well.
 
  • Thanks
Reactions: simmerskool

likeastar20

Level 9
Verified
Mar 24, 2016
422
Typically, I expect IT departments to receive the former so they can map out their threat prevention/response strategy.
I just don't like the way the emulation module is presented. Essentially, I would like it to be similar to the Bitdefender GravityZone Sandbox. I want it to be easily accessible, allowing me to effortlessly upload files for emulation, and I don't need to have the product installed...would have been perfect for me like that...

1.PNG
2.PNG
3.PNG
 
Last edited:
  • Like
Reactions: Trident

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Do you guys like the new or the legacy UI of the client more? The legacy UI is still available in client, after clicking on “Settings”.
 

Trident

Level 34
Thread author
Verified
Top Poster
Well-known
Feb 7, 2023
2,349
Press on menu and then settings should be somewhere there.
please may i ask how often does check point harmony endpoint receive updates ? thank you :)
Depends on which engine is chosen. Sophos updates are released on when-ready basis, this is normally few times a day. I believe Kaspersky published updates every few hours. The update check frequency can be configured in the portal.
Behavioural and static analysis machine learning models are updated once a day.
In addition, threat emulation cloud engines are updated every month and engine updates are available every 2 months. Third-party anti-malware engine updates are installed as soon as they are available, for example Sophos will soon release engine 3.86.
 
  • Applause
Reactions: simmerskool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top