<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protection against keyloggers in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28365#M655</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Endpoint Protection with Device Control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;If the keylogger is not recognized as a USB device, there is no way to block or control this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 04 Jun 2018 20:25:14 GMT</pubDate>
    <dc:creator>HeikoAnkenbrand</dc:creator>
    <dc:date>2018-06-04T20:25:14Z</dc:date>
    <item>
      <title>Protection against keyloggers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28364#M654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please,&lt;/P&gt;&lt;P&gt;Which Check Point Blade or feature protects against keyloggers ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2018 19:38:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28364#M654</guid>
      <dc:creator>AdaCoul</dc:creator>
      <dc:date>2018-06-04T19:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Protection against keyloggers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28365#M655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Endpoint Protection with Device Control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;If the keylogger is not recognized as a USB device, there is no way to block or control this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #1b1e25; background-color: #f8f8f8; font-size: 18px;"&gt;Heiko&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jun 2018 20:25:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28365#M655</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-06-04T20:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Protection against keyloggers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28366#M656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply. But I don't sure if we understand each other or maybe my question is not well asked. &lt;BR /&gt;What I intended is if there is a Check Point Module or Blade which protects against a keylogger (malware) which registers your entries when you hit keys by logging or when you enter your bank codes.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2018 10:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28366#M656</guid>
      <dc:creator>AdaCoul</dc:creator>
      <dc:date>2018-06-05T10:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: Protection against keyloggers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28367#M657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Malware is fought by the Threat Prevention Blades - not one blade, but AV, TE et al.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2018 10:52:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28367#M657</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-06-05T10:52:15Z</dc:date>
    </item>
    <item>
      <title>Re: Protection against keyloggers</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28368#M658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know that Anti-Malware blade flags one of the drivers for an HP laptop called mictray64.exe, which is located in C:\Windows\System32 folder.&amp;nbsp; It tells you that there is a high risk threat and then performs a deep scan on the laptop where you cannot do anything until its done.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a legit find, as technically there is a keylogger built into that driver, so yes, CheckPoint Endpoint will find and protect against keyloggers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2018 14:29:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Protection-against-keyloggers/m-p/28368#M658</guid>
      <dc:creator>Steve_Lander</dc:creator>
      <dc:date>2018-06-05T14:29:43Z</dc:date>
    </item>
  </channel>
</rss>

