<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: process monitoring can be possible in Checkpoint Endpoint in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/83158#M3140</link>
    <description>Application Control on Endpoint can restrict what binaries can run.&lt;BR /&gt;SandBlast Agent and some of the other endpoint controls can track and block malicious activities by any process.&lt;BR /&gt;Forensics will even tell you what process did what.&lt;BR /&gt;&lt;BR /&gt;So what is it you exactly are looking to do?</description>
    <pubDate>Sun, 26 Apr 2020 01:33:22 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-04-26T01:33:22Z</dc:date>
    <item>
      <title>process monitoring can be possible in Checkpoint Endpoint</title>
      <link>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/82882#M3139</link>
      <description>&lt;P&gt;I need to know if process monitoring can be possible in Checkpoint Endpoint&amp;nbsp;&lt;BR /&gt;needs to know if mstsc.exe needs to be watched or poweshell.exe or wmic.exe is executed&amp;nbsp; So that I can build queries ..for DLL Side-loading.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 08:21:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/82882#M3139</guid>
      <dc:creator>ritenm</dc:creator>
      <dc:date>2020-04-23T08:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: process monitoring can be possible in Checkpoint Endpoint</title>
      <link>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/83158#M3140</link>
      <description>Application Control on Endpoint can restrict what binaries can run.&lt;BR /&gt;SandBlast Agent and some of the other endpoint controls can track and block malicious activities by any process.&lt;BR /&gt;Forensics will even tell you what process did what.&lt;BR /&gt;&lt;BR /&gt;So what is it you exactly are looking to do?</description>
      <pubDate>Sun, 26 Apr 2020 01:33:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/83158#M3140</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-26T01:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: process monitoring can be possible in Checkpoint Endpoint</title>
      <link>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/83460#M3141</link>
      <description>&lt;P&gt;Checkpoint now offers a beta version of threat hunt as part of Infinity portal.&lt;/P&gt;
&lt;P&gt;Using threat hunt you can easily create complex queries based on raw enriched data collected from the endpoints.&lt;/P&gt;
&lt;P&gt;Data collected includes process, connections, files, registry events and more.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible to join the beta program by logging to the Infinity portal (&lt;A href="https://portal.checkpoint.com/signin" target="_blank"&gt;https://portal.checkpoint.com/signin&lt;/A&gt;) and apply a request to be added to the threat hunt beta program.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 09:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/process-monitoring-can-be-possible-in-Checkpoint-Endpoint/m-p/83460#M3141</guid>
      <dc:creator>Yoni_Nave</dc:creator>
      <dc:date>2020-04-28T09:18:44Z</dc:date>
    </item>
  </channel>
</rss>

