<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Detect/Precent powershell execution in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Detect-Precent-powershell-execution/m-p/252689#M10638</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I would like to ask what is the best approach to prevent and/or monitor the execution of PowerShell scripts or even the use of the PowerShell application on the computers in my IT environment, using Check Point Endpoint Security.&lt;/P&gt;&lt;P&gt;My objectives are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Preventing PowerShell execution (in cases where it's not required by end users);&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Detecting/alerting when PowerShell is executed — especially in suspicious contexts (e.g., powershell.exe -Encoded Command, etc.);&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Monitoring or blocking the creation/execution of &lt;STRONG&gt;Scheduled Tasks&lt;/STRONG&gt; (schtasks.exe), which are often used for malicious persistence.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Specific questions:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Is it possible to create &lt;STRONG&gt;block rules&lt;/STRONG&gt; to prevent PowerShell usage, while allowing exceptions if needed?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there ways to &lt;STRONG&gt;generate alerts or detailed logs&lt;/STRONG&gt; when PowerShell is executed (even if it's legitimate)?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Does Harmony Endpoint allow for visibility over &lt;STRONG&gt;suspicious scheduled task creation&lt;/STRONG&gt;?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there any &lt;STRONG&gt;best practices or recommended profiles&lt;/STRONG&gt; to mitigate this type of behavior?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I appreciate any guidance or sharing of experiences with these configurations.&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;K&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jul 2025 15:41:47 GMT</pubDate>
    <dc:creator>kiikoo15</dc:creator>
    <dc:date>2025-07-07T15:41:47Z</dc:date>
    <item>
      <title>Detect/Precent powershell execution</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Detect-Precent-powershell-execution/m-p/252689#M10638</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I would like to ask what is the best approach to prevent and/or monitor the execution of PowerShell scripts or even the use of the PowerShell application on the computers in my IT environment, using Check Point Endpoint Security.&lt;/P&gt;&lt;P&gt;My objectives are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Preventing PowerShell execution (in cases where it's not required by end users);&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Detecting/alerting when PowerShell is executed — especially in suspicious contexts (e.g., powershell.exe -Encoded Command, etc.);&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Monitoring or blocking the creation/execution of &lt;STRONG&gt;Scheduled Tasks&lt;/STRONG&gt; (schtasks.exe), which are often used for malicious persistence.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;Specific questions:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Is it possible to create &lt;STRONG&gt;block rules&lt;/STRONG&gt; to prevent PowerShell usage, while allowing exceptions if needed?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there ways to &lt;STRONG&gt;generate alerts or detailed logs&lt;/STRONG&gt; when PowerShell is executed (even if it's legitimate)?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Does Harmony Endpoint allow for visibility over &lt;STRONG&gt;suspicious scheduled task creation&lt;/STRONG&gt;?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there any &lt;STRONG&gt;best practices or recommended profiles&lt;/STRONG&gt; to mitigate this type of behavior?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I appreciate any guidance or sharing of experiences with these configurations.&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;K&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 15:41:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Detect-Precent-powershell-execution/m-p/252689#M10638</guid>
      <dc:creator>kiikoo15</dc:creator>
      <dc:date>2025-07-07T15:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Detect/Precent powershell execution</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Detect-Precent-powershell-execution/m-p/252714#M10639</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/121487"&gt;@kiikoo15&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe that first you could use this functionality below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Application-Control-configuring-the-policy.html" target="_blank"&gt;Configuring Application Permissions in the Application Control Policy&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 19:28:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Detect-Precent-powershell-execution/m-p/252714#M10639</guid>
      <dc:creator>lluner</dc:creator>
      <dc:date>2025-07-07T19:28:03Z</dc:date>
    </item>
  </channel>
</rss>

