<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Endpoint Security / SandBlast Agent Newsletter - Versions E80.89 &amp; E80.90 in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-SandBlast-Agent-Newsletter-Versions-E80-89-E80/m-p/24064#M527</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;In the past few weeks we released two monthly releases of Endpoint Security / SandBlast Agent version E80.89 &amp;amp; E80.90.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;This newsletter will summarize the new features and enhancements delivered in these releases and will begin a new tradition of Endpoint security newsletters we will send upon each release in 2019.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;We will be happy to hear feedbacks or any suggestions for improvements.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #1f497d; font-size: 14.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785; font-size: 14.0pt;"&gt;New Features:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #1f497d;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Windows 10 October 2018 Update Support&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Windows Server 2019 Support&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;No Reboot Deployment&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;Till today, upgrade to a new Endpoint client had a big impact on the company employees, requiring everyone to reboot their machines. To improve this experience, and make the deployment smoother, we removed the need to reboot during most upgrade and installation scenarios.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Upgrades from E80.89 to later releases for most blades are supported without reboots. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: 1.75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Note: Upgrades of some Full Disk Encryption, Media Encryption and Port Protection, Capsule Docs and Anti-Malware versions might require reboot. (See &lt;/SPAN&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141233&amp;amp;partition=General&amp;amp;product=Endpoint"&gt;&lt;SPAN style="color: black;"&gt;sk141233&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Enhanced Fileless and Malicious PowerShell Detections engine extending Behavioral Guard capabilities. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Fileless attacks are a very fast growing breed of attacks that don't involve the saving of a malicious file on disk. These attacks utilize script applications provided by Microsoft Windows like PowerShell. In this release, we extend Behavioral Guard capabilities to protect against Fileless and PowerShell based attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Behavioral Guard now includes a multi-phase detection in order to overcome PowerShell obfuscation and encoding techniques. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;In addition, in Windows 10, Behavioral Guard integrates with Microsoft’s Anti-Malware Scan Interface (AMSI) to receive and analyze decoded scripts. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;On detection the script content will be visible in the Forensics report for further analysis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 5.0pt 1.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Forensic report overhaul with a new style and completely redesigned Overview and General screens. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: black;"&gt;As attacks evolve there is an ever greater need to be able to identify, classify and prioritize the attacks being mitigated on the endpoint. To that end, we have made changes to the Forensics report to better include and highlight reputation and attack data. This translates to tighter integration with Reputation and a redesigned Forensic Report with more emphasis on the attack details.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Redesigned Overview screen with focus on attack details, type and name&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Redesigned General screen with more details on the trigger for the attack&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Malware Family name when present in both the overview and individual process details.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;The Tree and Tree-Timeline views were updated with navigational toolbars that enable the ability to more quickly find processes of interest.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Many more changes are present, view the full release notes&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Forensics now has major performance improvements. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;Forensics is one of the most powerful EDR systems that exist today, however it does record a lot of data. This has led to I/O issues on a few machines. By analyzing the data collected over a two year period, we have identified records that do not need to be stored in order for the Forensic Report to be accurately generated.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Reduced on average about 50% of file ops stored&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Reduced on average about 10% of registry ops stored.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Boosted Forensics Analyzer performance on average by 20%.&lt;/P&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Anti-Exploit new detections and default protections&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;We continue to strengthen our Anti-Exploit technology with protection from new attack vectors. Anti-Exploit relies on the fact that there are a limited number of methods that a vulnerability in a process can be exploited (like Return Oriented Programming) and includes protections for these methods. This provides automatic protection for new zero day attacks that exploit new vulnerabilities. By monitoring the exploit landscape, we have added another protection and enhanced our protections to cover a new application.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;Stack Pivoting protection – added protection for a new potential technique which involves an exploit attempting to create a fake stack from attacker controlled memory like a heap.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;MS Equation Editor protection - given the prevalence of attacks that are running on Equation Editor, we added it to our default protected processes.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785; font-size: 14.0pt;"&gt;Those releases also include many Improvements and Enhancements:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.9pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;E80.90:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Ransomware, Behavioral Guard and Forensics &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic reports with decoded PowerShell scripts from AMSI integration. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This feature is only available in Windows 10. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensics performance by adding dynamic exclusions for file operations based on a new heuristic. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: .75in; text-indent: .5in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This can reduce the number of file operations stored by up to 30%. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Updates the default exclusions for Anti-Ransomware. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Enhances Behavioral Guard with the ability to do deep inspections of both behavior and script content of PowerShell and Fileless attacks. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds many new suspicious events for the Forensic report, including new PowerShell related suspicious events. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue that could lead to incomplete termination of processes involved in a Ransomware incident. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Entry Point calculations across multiple scenarios to be more accurate in the Forensic Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Shows termination status of processes for every process shown in the Forensics report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The Forensics report now shows the termination status for every process present in the report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue where some Forensic report icons may be missing when upgrading to E80.89. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The icons are now present when upgrading to E80.90. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes rare issue with large continuous CPU utilization when the Forensics service is unable to communicate with the driver. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic performance by adding static exclusions for well-known file operations. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This addition alone can reduce the number of file operations stored by up to 80% on some machines. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a crash occurring when Forensics, Anti-Ransomware and Behavior Guard are processing an existing policy while receiving a new policy. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue with the scroll bar not appearing correctly if there are multiple nodes in the Entry Point view of the Forensics Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a Forensics Analysis issue where script processes like PowerShell do not appear in the report when Cmd is involved and the script process is not the trigger. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a majority of issues where the Entry Point of an attack could be empty. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Now there should almost always be an Entry Point. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Processes showing in a report that are closed at the time of the generation of the report will now correctly show as terminated, even if the remediation policy for termination is disabled. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves the Forensics report so that Command Prompts (cmd.exe) opened for typing no longer appear in the Forensic report, but may appear in the Entry Point instead. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Process arguments and script contents are now encoded in the Forensic reports. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This prevents the deletion of the reports by Anti-Viruses looking for specific signatures found in the argument or script content. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds support to include the Malware Family from URL reputation if present in the Forensic report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves the Forensic Analysis to consider following files in the argument of processes already included as part of the incident. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue which could result in the User Name appearing empty in the Forensic Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a visual issue in the Forensic report where the distance between processes could be very large if a process has a lot of lines of text. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue which caused duplication of log events in Forensics. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic performance by dynamically excluding registry operations based on a new heuristic. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;On average, 10% of registry operations are now excluded. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Threat Emulation and Anti-Exploit &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Anti-Exploit now has an additional exploit prevention technology called stack pivoting. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Anti-Exploit now protects Equation Editor from known and unknown exploit attempts. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 2.0pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Bot &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a crash when the Anti-Bot database is held by another process in the system. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 2.0pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;SandBlast Agent Updater &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds support for Static Analysis updates running in parallel to other updates using the Updater. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue where the wrong service is restarted when updating two products together.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.9pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;E80.89:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Ransomware, Behavioral Guard and Forensics&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Forensics reports no longer show Anti-Bot in "detect" mode as having a "Blocked" status. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a Forensics Analysis issue when incidents that include the Task Scheduler may add unrelated processes to the Forensics report. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a Forensics analysis issue where some "riskware" processes are not properly followed and terminated. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Forensics reports now include the Malware Family Name when available to the reputation section of a process. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a rare Forensics analysis issue when an entry point jumps between different browsers incorrectly. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The Forensic report's network view now shows entry point URLs and associated Domains. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Enforces exclusions of Check Point signed process related file activity in the driver to improve Forensics performance. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Threat Emulation and Anti-Exploit&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolved few cases where Threat Emulation file monitoring locked the file interfering with other application usage&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt .75in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: windowtext;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: windowtext; font-size: 9.0pt;"&gt;SandBlast Agent Infrastructure &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: windowtext;"&gt;Resolves an issue of Remediation request ID collisions and the interference in remediation if multiple requests appear together. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="font-size: 9.0pt;"&gt;Client Infrastructure&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in; background: white;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Software Development Status reporting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;For more information about E80.90, refer to: &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk143452"&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;Enterprise Endpoint Security E80.90 Windows Clients&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;For more information about E80.89, refer to: &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk141233"&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;Enterprise Endpoint Security E80.89 Windows Clients&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;Please contact us if you encounter any issues. We are happy to hear from you at any time. Your feedback is valuable to us.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Gil Sasson&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Endpoint Cyber Security Project Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Jan 2019 09:48:02 GMT</pubDate>
    <dc:creator>Gil_Sasson</dc:creator>
    <dc:date>2019-01-13T09:48:02Z</dc:date>
    <item>
      <title>Endpoint Security / SandBlast Agent Newsletter - Versions E80.89 &amp; E80.90</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-SandBlast-Agent-Newsletter-Versions-E80-89-E80/m-p/24064#M527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;In the past few weeks we released two monthly releases of Endpoint Security / SandBlast Agent version E80.89 &amp;amp; E80.90.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;This newsletter will summarize the new features and enhancements delivered in these releases and will begin a new tradition of Endpoint security newsletters we will send upon each release in 2019.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;We will be happy to hear feedbacks or any suggestions for improvements.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #1f497d; font-size: 14.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785; font-size: 14.0pt;"&gt;New Features:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #1f497d;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Windows 10 October 2018 Update Support&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Windows Server 2019 Support&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;No Reboot Deployment&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;Till today, upgrade to a new Endpoint client had a big impact on the company employees, requiring everyone to reboot their machines. To improve this experience, and make the deployment smoother, we removed the need to reboot during most upgrade and installation scenarios.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Upgrades from E80.89 to later releases for most blades are supported without reboots. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: 1.75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Note: Upgrades of some Full Disk Encryption, Media Encryption and Port Protection, Capsule Docs and Anti-Malware versions might require reboot. (See &lt;/SPAN&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141233&amp;amp;partition=General&amp;amp;product=Endpoint"&gt;&lt;SPAN style="color: black;"&gt;sk141233&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Enhanced Fileless and Malicious PowerShell Detections engine extending Behavioral Guard capabilities. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Fileless attacks are a very fast growing breed of attacks that don't involve the saving of a malicious file on disk. These attacks utilize script applications provided by Microsoft Windows like PowerShell. In this release, we extend Behavioral Guard capabilities to protect against Fileless and PowerShell based attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;Behavioral Guard now includes a multi-phase detection in order to overcome PowerShell obfuscation and encoding techniques. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;In addition, in Windows 10, Behavioral Guard integrates with Microsoft’s Anti-Malware Scan Interface (AMSI) to receive and analyze decoded scripts. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;On detection the script content will be visible in the Forensics report for further analysis.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 5.0pt 1.25in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Forensic report overhaul with a new style and completely redesigned Overview and General screens. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: black;"&gt;As attacks evolve there is an ever greater need to be able to identify, classify and prioritize the attacks being mitigated on the endpoint. To that end, we have made changes to the Forensics report to better include and highlight reputation and attack data. This translates to tighter integration with Reputation and a redesigned Forensic Report with more emphasis on the attack details.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Redesigned Overview screen with focus on attack details, type and name&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Redesigned General screen with more details on the trigger for the attack&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Malware Family name when present in both the overview and individual process details.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;The Tree and Tree-Timeline views were updated with navigational toolbars that enable the ability to more quickly find processes of interest.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Many more changes are present, view the full release notes&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.0in;"&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Forensics now has major performance improvements. &lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;Forensics is one of the most powerful EDR systems that exist today, however it does record a lot of data. This has led to I/O issues on a few machines. By analyzing the data collected over a two year period, we have identified records that do not need to be stored in order for the Forensic Report to be accurately generated.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Reduced on average about 50% of file ops stored&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Reduced on average about 10% of registry ops stored.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;Boosted Forensics Analyzer performance on average by 20%.&lt;/P&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 5.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black;"&gt;Anti-Exploit new detections and default protections&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;We continue to strengthen our Anti-Exploit technology with protection from new attack vectors. Anti-Exploit relies on the fact that there are a limited number of methods that a vulnerability in a process can be exploited (like Return Oriented Programming) and includes protections for these methods. This provides automatic protection for new zero day attacks that exploit new vulnerabilities. By monitoring the exploit landscape, we have added another protection and enhanced our protections to cover a new application.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;Stack Pivoting protection – added protection for a new potential technique which involves an exploit attempting to create a fake stack from attacker controlled memory like a heap.&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;-&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;MS Equation Editor protection - given the prevalence of attacks that are running on Equation Editor, we added it to our default protected processes.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1f497d;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #e45785; font-size: 14.0pt;"&gt;Those releases also include many Improvements and Enhancements:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.9pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;E80.90:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Ransomware, Behavioral Guard and Forensics &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic reports with decoded PowerShell scripts from AMSI integration. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This feature is only available in Windows 10. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensics performance by adding dynamic exclusions for file operations based on a new heuristic. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: .75in; text-indent: .5in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This can reduce the number of file operations stored by up to 30%. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Updates the default exclusions for Anti-Ransomware. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Enhances Behavioral Guard with the ability to do deep inspections of both behavior and script content of PowerShell and Fileless attacks. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds many new suspicious events for the Forensic report, including new PowerShell related suspicious events. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue that could lead to incomplete termination of processes involved in a Ransomware incident. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Entry Point calculations across multiple scenarios to be more accurate in the Forensic Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Shows termination status of processes for every process shown in the Forensics report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The Forensics report now shows the termination status for every process present in the report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue where some Forensic report icons may be missing when upgrading to E80.89. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The icons are now present when upgrading to E80.90. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes rare issue with large continuous CPU utilization when the Forensics service is unable to communicate with the driver. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic performance by adding static exclusions for well-known file operations. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This addition alone can reduce the number of file operations stored by up to 80% on some machines. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a crash occurring when Forensics, Anti-Ransomware and Behavior Guard are processing an existing policy while receiving a new policy. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue with the scroll bar not appearing correctly if there are multiple nodes in the Entry Point view of the Forensics Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a Forensics Analysis issue where script processes like PowerShell do not appear in the report when Cmd is involved and the script process is not the trigger. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a majority of issues where the Entry Point of an attack could be empty. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Now there should almost always be an Entry Point. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Processes showing in a report that are closed at the time of the generation of the report will now correctly show as terminated, even if the remediation policy for termination is disabled. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves the Forensics report so that Command Prompts (cmd.exe) opened for typing no longer appear in the Forensic report, but may appear in the Entry Point instead. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Process arguments and script contents are now encoded in the Forensic reports. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;This prevents the deletion of the reports by Anti-Viruses looking for specific signatures found in the argument or script content. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds support to include the Malware Family from URL reputation if present in the Forensic report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves the Forensic Analysis to consider following files in the argument of processes already included as part of the incident. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue which could result in the User Name appearing empty in the Forensic Report. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a visual issue in the Forensic report where the distance between processes could be very large if a process has a lot of lines of text. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue which caused duplication of log events in Forensics. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Forensic performance by dynamically excluding registry operations based on a new heuristic. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;On average, 10% of registry operations are now excluded. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Threat Emulation and Anti-Exploit &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Anti-Exploit now has an additional exploit prevention technology called stack pivoting. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Anti-Exploit now protects Equation Editor from known and unknown exploit attempts. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 2.0pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Bot &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes a crash when the Anti-Bot database is held by another process in the system. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-bottom: 2.0pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 2.0pt .75in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;SandBlast Agent Updater &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Adds support for Static Analysis updates running in parallel to other updates using the Updater. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Fixes an issue where the wrong service is restarted when updating two products together.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 1.9pt;"&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;E80.89:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Anti-Ransomware, Behavioral Guard and Forensics&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Forensics reports no longer show Anti-Bot in "detect" mode as having a "Blocked" status. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a Forensics Analysis issue when incidents that include the Task Scheduler may add unrelated processes to the Forensics report. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a Forensics analysis issue where some "riskware" processes are not properly followed and terminated. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Forensics reports now include the Malware Family Name when available to the reputation section of a process. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolves a rare Forensics analysis issue when an entry point jumps between different browsers incorrectly. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;The Forensic report's network view now shows entry point URLs and associated Domains. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Enforces exclusions of Check Point signed process related file activity in the driver to improve Forensics performance. &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: black; font-size: 9.0pt;"&gt;Threat Emulation and Anti-Exploit&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 5.0pt; color: black;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Resolved few cases where Threat Emulation file monitoring locked the file interfering with other application usage&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 1.9pt .75in;"&gt;&lt;SPAN style="font-size: 5.0pt; color: windowtext;"&gt; &lt;/SPAN&gt;&lt;STRONG style="color: windowtext; font-size: 9.0pt;"&gt;SandBlast Agent Infrastructure &lt;/STRONG&gt;&lt;/LI&gt;&lt;LI style="text-indent: -.25in; margin: 0in 0in 12.0pt 1.25in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: windowtext;"&gt;Resolves an issue of Remediation request ID collisions and the interference in remediation if multiple requests appear together. &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-left: .75in; text-indent: -.25in;"&gt;&lt;SPAN style="font-size: 7.0pt;"&gt; &lt;/SPAN&gt;&lt;STRONG style="font-size: 9.0pt;"&gt;Client Infrastructure&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="margin-left: 1.25in; text-indent: -.25in; background: white;"&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-size: 7.0pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 9.0pt; color: black;"&gt;Improves Software Development Status reporting.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;For more information about E80.90, refer to: &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk143452"&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;Enterprise Endpoint Security E80.90 Windows Clients&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;For more information about E80.89, refer to: &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk141233"&gt;&lt;SPAN style="color: blue; text-decoration: underline;"&gt;Enterprise Endpoint Security E80.89 Windows Clients&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .25in;"&gt;&lt;SPAN style="color: black;"&gt;Please contact us if you encounter any issues. We are happy to hear from you at any time. Your feedback is valuable to us.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Gil Sasson&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black;"&gt;Endpoint Cyber Security Project Manager&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2019 09:48:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Endpoint-Security-SandBlast-Agent-Newsletter-Versions-E80-89-E80/m-p/24064#M527</guid>
      <dc:creator>Gil_Sasson</dc:creator>
      <dc:date>2019-01-13T09:48:02Z</dc:date>
    </item>
  </channel>
</rss>

