<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remediation Steps in Portal</title>
    <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229745#M409</link>
    <description>&lt;P&gt;Most likely from from an embedded library or domain ?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once the files are quarantined is there a way from Infinity portal to re-scan and confirm they are clean before releasing them ?&lt;/P&gt;</description>
    <pubDate>Tue, 15 Oct 2024 13:11:54 GMT</pubDate>
    <dc:creator>misj2</dc:creator>
    <dc:date>2024-10-15T13:11:54Z</dc:date>
    <item>
      <title>Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229569#M401</link>
      <description>&lt;P&gt;I am new to harmony checkpoint endpoint and would like some guidance as to what the normal process is for companies when we encounter endpoint clients being flagged as malicious activity files quantined by Checkpoint,&amp;nbsp; under cyber security endpoint reporting for malware and antibot as active or blocked ?&amp;nbsp; At the moment our only step is to remove devices off the networks a re-image if they are infected.&lt;/P&gt;&lt;P&gt;Do checkpoint have any remediation tools or techniques to assist with confirming if they are false positives or genuinely infected ?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2024 08:55:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229569#M401</guid>
      <dc:creator>misj2</dc:creator>
      <dc:date>2024-10-14T08:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229639#M403</link>
      <description>&lt;P&gt;It depends on the type/severity of the incident as well as what's normal/expected in your environment.&lt;/P&gt;
&lt;P&gt;There are some general hints for dealing with these situations (not specific to Check Point) here:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Incident-Response/No-Suits-No-Ties-MDR-and-Incident-Response-Going-Equipped-to/ba-p/226186" target="_blank"&gt;https://community.checkpoint.com/t5/Incident-Response/No-Suits-No-Ties-MDR-and-Incident-Response-Going-Equipped-to/ba-p/226186&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2024 19:20:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229639#M403</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-14T19:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229646#M404</link>
      <description>&lt;P&gt;One example of alerts include the following captured by protection :&amp;nbsp;CeptBiro.TC.b726jHEV&amp;nbsp; , a few files were quarantined.&amp;nbsp; How to confirm if its a false positive or genuine malicious activity ?&lt;/P&gt;&lt;P&gt;URL : &lt;A href="https://community.checkpoint.com/link%20removed" target="_blank"&gt;http://polyfill.io:443&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Original Source URL : &lt;A href="https://builtwith.com/aquila-capital.de" target="_blank"&gt;https://builtwith.com/aquila-capital.de&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;{"Nombre de protección":"CeptBiro.TC.b726jHEV","Medida adoptada":"Evitado","URL":&lt;A href="http://polyfill.io:443" target="_blank"&gt;http://polyfill.io:443&lt;/A&gt;,"Nombre del proceso":"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe","Identificador del proceso":"17248","Nombre del usuario":"PAZR1","Identificador del proceso principal":"0","Fecha y hora de primera infección":"14 de oct. de 2024 14:58","Fecha y hora de última infección":"14 de oct. de 2024 14:58"}&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2024 21:24:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229646#M404</guid>
      <dc:creator>misj2</dc:creator>
      <dc:date>2024-10-14T21:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229661#M405</link>
      <description>&lt;P&gt;polyfill.io is a a legitimate issue described here (among other places):&amp;nbsp;&lt;A href="https://fossa.com/blog/polyfill-supply-chain-attack-details-fixes/" target="_blank"&gt;https://fossa.com/blog/polyfill-supply-chain-attack-details-fixes/&lt;/A&gt;&lt;BR /&gt;However, the domain&amp;nbsp;registrar took the site offline a few months ago (DNS doesn't resolve), so I'm not sure how malware was downloaded from that domain.&lt;/P&gt;
&lt;P&gt;Best to check this with TAC: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 00:22:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229661#M405</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-15T00:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229745#M409</link>
      <description>&lt;P&gt;Most likely from from an embedded library or domain ?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once the files are quarantined is there a way from Infinity portal to re-scan and confirm they are clean before releasing them ?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 13:11:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229745#M409</guid>
      <dc:creator>misj2</dc:creator>
      <dc:date>2024-10-15T13:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: Remediation Steps</title>
      <link>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229780#M410</link>
      <description>&lt;P&gt;You can trigger an Anti-Malware scan via Push Operation.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-Common-for-HEP-HB/Managing_Computers.htm?tocpath=Viewing%20Computer%20Information%7CManaging%20Computers%7C_____2#Push_Operations_..37" target="_blank"&gt;https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-Common-for-HEP-HB/Managing_Computers.htm?tocpath=Viewing%20Computer%20Information%7CManaging%20Computers%7C_____2#Push_Operations_..37&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2024 15:58:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Portal/Remediation-Steps/m-p/229780#M410</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-15T15:58:06Z</dc:date>
    </item>
  </channel>
</rss>

