<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Devolutions - Remote Desktop manager - reported as ransomeware - Harmony Endpoint - Behavioral G in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/212056#M8548</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Solution Description form CP TAC service request: Remote admin tools are considered PUA under&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Check&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Point's policies due to their capabilities, therefor this one is considered TP. If the customer trusts the use of this specific one internally and uses it safely he may create a local exception for this one. Exclusion suggestion provided&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Apr 2024 12:18:55 GMT</pubDate>
    <dc:creator>Mitja-S3NEXT</dc:creator>
    <dc:date>2024-04-23T12:18:55Z</dc:date>
    <item>
      <title>Devolutions - Remote Desktop manager - reported as ransomeware - Harmony Endpoint - Behavioral Guide</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211107#M8510</link>
      <description>&lt;P&gt;This was alreasy sent to the emergency response e-mail&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Incident: 6c157e2b-5e8a-4d1e-9a17-5d70e5f2ba2f&lt;BR /&gt;Status: Active&lt;BR /&gt;User: *******&lt;BR /&gt;Computer: *******&lt;BR /&gt;OS: Windows 10&lt;BR /&gt;Trigger: c:\windows\system32\rundll32.exe&lt;BR /&gt;Triggered by: Endpoint Behavioral Guard&lt;BR /&gt;Trigger Time: 12. 4. 2024, 08:54:24&lt;BR /&gt;Protection Name: behavioral.win.anonymousmemorype.a&lt;BR /&gt;Entry Point: ****-PC\**** was logged in. &lt;STRONG&gt;msiexec.exe created [remotedesktopmanager_x64.exe]&lt;/STRONG&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 07:21:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211107#M8510</guid>
      <dc:creator>Mitja-S3NEXT</dc:creator>
      <dc:date>2024-04-12T07:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Devolutions - Remote Desktop manager - reported as ransomeware - Harmony Endpoint - Behavioral G</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211111#M8511</link>
      <description>&lt;P&gt;Why not open SR# with CP TAC?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 08:24:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211111#M8511</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-12T08:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: Devolutions - Remote Desktop manager - reported as ransomeware - Harmony Endpoint - Behavioral G</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211214#M8514</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Service Request: 6-0003913660 opened &lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2024 18:59:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/211214#M8514</guid>
      <dc:creator>Mitja-S3NEXT</dc:creator>
      <dc:date>2024-04-13T18:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Devolutions - Remote Desktop manager - reported as ransomeware - Harmony Endpoint - Behavioral G</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/212056#M8548</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Solution Description form CP TAC service request: Remote admin tools are considered PUA under&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Check&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Point's policies due to their capabilities, therefor this one is considered TP. If the customer trusts the use of this specific one internally and uses it safely he may create a local exception for this one. Exclusion suggestion provided&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 12:18:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Devolutions-Remote-Desktop-manager-reported-as-ransomeware/m-p/212056#M8548</guid>
      <dc:creator>Mitja-S3NEXT</dc:creator>
      <dc:date>2024-04-23T12:18:55Z</dc:date>
    </item>
  </channel>
</rss>

