<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Harmony endpoint - anti exploit , How it works ? in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185981#M7244</link>
    <description>&lt;P&gt;Depends on the CVE, but yes.&lt;/P&gt;</description>
    <pubDate>Sun, 09 Jul 2023 14:58:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-07-09T14:58:47Z</dc:date>
    <item>
      <title>Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185381#M7215</link>
      <description>&lt;P&gt;Hi expert&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have question regarding to the product "Harmony endpoint" with feature "anti-exploit"&amp;nbsp; , I want to know in detail how it works ?&lt;/P&gt;&lt;P&gt;and how many CVE that it can protect , How harmony endpoint apply or monitor for each exploit activity&amp;nbsp; , How harmony endpoint can protect against vulnerability attack&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As i understand there are two part&lt;/P&gt;&lt;P&gt;1. Signature based protection , block before process run&lt;/P&gt;&lt;P&gt;2. Anti-exploit behavioral based protection stop process before endpoint was exploited&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Datasheet information&lt;/P&gt;&lt;P&gt;Anti-Exploit&lt;/P&gt;&lt;P&gt;Provides protection against exploit-based attacks compromising legitimate applications, ensuring those vulnerabilities can’t be leveraged. Harmony Endpoint Shuts down the exploited process upon detecting one, remediates the entire attack chain&lt;/P&gt;</description>
      <pubDate>Sun, 02 Jul 2023 10:08:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185381#M7215</guid>
      <dc:creator>PrivateMM</dc:creator>
      <dc:date>2023-07-02T10:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185497#M7221</link>
      <description>&lt;P&gt;Anti-Exploit is protecting against two types of attacks: IAT/EAT and ROP.&lt;BR /&gt;In the case of IAT/EAT, we are detect and block access to the import/export tables of loaded DLLs (used to bypass Address Space Layout Randomization).&lt;BR /&gt;In the case of ROP, which is a well-known technique used to bypass Data Execution Protection, we detect and block calls to Windows APIs used in a ROP chain.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 19:21:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185497#M7221</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-07-03T19:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185905#M7237</link>
      <description>&lt;P&gt;Can anti exploit protect against CVE attack&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2023 11:47:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185905#M7237</guid>
      <dc:creator>PrivateMM</dc:creator>
      <dc:date>2023-07-07T11:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185981#M7244</link>
      <description>&lt;P&gt;Depends on the CVE, but yes.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jul 2023 14:58:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185981#M7244</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-07-09T14:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185991#M7245</link>
      <description>&lt;P&gt;Does Check Point ever publish specific Anti-Exploit protections intended to protect against specific exploits? We've had questions regarding this asked by our customers on a number of occassions.&lt;/P&gt;
&lt;P&gt;advisories.checkpoint.com is a wonderful resource, but more often than not the only explicitly mentioned thing is an IPS protection for the Security Gateway.&lt;/P&gt;
&lt;P&gt;In terms of Endpoint, we've never actually received a definitive answer from the advisories portal. In a case where we had to consult with TAC it took a little while (few redirects among departments and ticket holders) until we received an answer that EP did not have a specific protection for the vulnerability. Which I suppose is okay and understandable, you can't cover every CVE.&lt;/P&gt;
&lt;P&gt;It would just be good to have a bit more positive feedback on Anti-Exploit and what it may actually defend against.&lt;BR /&gt;In general when it comes to high profile threats and exploits, some sort of (fairly accessible) "playbook" article would be really good to have.&amp;nbsp;&lt;BR /&gt;With Log4J CHKP did come out with a script you could execute through the Endpoint (albeit it was much easier to just do it through GPO as it was just a powershell script), but it was a form of response at least.&lt;/P&gt;
&lt;P&gt;Perhaps during emergence of these "high profile" exploits some custom queries for Threat Hunting could be suggested? Would be great to have a "go-to" response for our customers letting them know that Harmony EP is there for them in some capacity.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jul 2023 17:38:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185991#M7245</guid>
      <dc:creator>Swiftyyyy</dc:creator>
      <dc:date>2023-07-09T17:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony endpoint - anti exploit , How it works ?</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185993#M7246</link>
      <description>&lt;P&gt;The advisories page you pointed to is specific to IPS.&lt;/P&gt;
&lt;P&gt;Anti-Exploit, like many of the Harmony Endpoint controls, block specific attack vectors and are not signature based.&lt;BR /&gt;You can see some confirmation of this here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Capabilities-of-Offline-Endpoint-Security-Client.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Capabilities-of-Offline-Endpoint-Security-Client.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know for high profile exploits, we do tend to publish blog posts that explain how we protect against them, much like we did for Log4J.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Jul 2023 21:02:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-endpoint-anti-exploit-How-it-works/m-p/185993#M7246</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-07-09T21:02:04Z</dc:date>
    </item>
  </channel>
</rss>

