<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212149#M8558</link>
    <description>&lt;P&gt;Thanks for the feedback. Note this release includes analysis of DNS requests. Can you please check whether you have any anti-bit detections related to these DNS messages?&lt;/P&gt;
&lt;P&gt;====================================================================================================&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Anti-Bot Blade now includes DNS Inspection support, which utilizes Check Point Threat Cloud engines for the analysis of DNS traffic. This protection allows Anti-Bot to block access to malicious domains during the DNS resolution process. Existing Anti-Bot settings apply to the DNS detections as well&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Apr 2024 09:33:57 GMT</pubDate>
    <dc:creator>JonnyRabinowitz</dc:creator>
    <dc:date>2024-04-24T09:33:57Z</dc:date>
    <item>
      <title>Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/211941#M8535</link>
      <description>&lt;P&gt;Happy to share!!&lt;/P&gt;
&lt;P&gt;Check Point &lt;STRONG&gt;Harmony Endpoint Security Client&lt;/STRONG&gt; &lt;STRONG&gt;E88.30 for Windows&lt;/STRONG&gt; is now available as &lt;STRONG&gt;GA&lt;/STRONG&gt; (General Availability). This release includes both enhancements and resolved issues.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Enhancements&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Enhancements included in this release include the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Disable Capabilities Enhancements: &lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Within the “General” section of the “Client Settings” under policy, there is an option that can allow end users, to disable client capabilities from the client UI. There are two enhancements added to this capability:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;Password: It is possible to define a password, that must be entered on the client UI, before capabilities can be disabled&lt;/LI&gt;
&lt;LI&gt;Timeout: Period, defined in minutes, after which any detection capabilities disabled will be automatically restored to operation, if this was not previously done&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;Can see more information in the relevant section in the Administration Guide: &lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/General.htm#Disable_Capabilities" target="_blank"&gt;https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/General.htm#Disable_Capabilities&lt;/A&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;DNS Inspection Support: &lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The Anti-Bot Blade now includes DNS Inspection support, which utilizes Check Point Threat Cloud engines for the analysis of DNS traffic. This protection allows Anti-Bot to block access to malicious domains during the DNS resolution process. Existing Anti-Bot settings apply to the DNS detections as well&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;CPInfo Collection to S3&lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;“Push Operations” allow requests to be sent to specific clients. When selecting “Collect Client Logs” under “Agent Settings”, there is an additional option available to upload the log data (CPInfo) to Amazon Simple Storage Service (S3) where it can be later accessed&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Ability to change Harmony Endpoint client's language from the management UI&lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Within the “User Interface” section of the “Client Settings” under policy, there are additional options that allow explicit selection of a language for utilization in the client UI. These options are in addition to the previously supported functionality which can still be enabled by selecting the “Default” option. When ‘Default’ is selected the client attempts to utilize the language as determined by the locale defined on the client. If language display for the locale is not supported on the client, then English will be used as the client language&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Changes to Threat Emulation Blade&lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Previously, the Windows client included the “Threat Emulation” blade. This blade allowed for selection of the Detection Mode for “Files Threat Emulation” mode and this setting also implicitly set the Prevent / Detect mode for other capabilities that execute in the same blade, such as File Reputation and Static Analysis detections. The “Threat Emulation” blade was also required to be running when selection of E2 Anti-Malware engine was selected&lt;/P&gt;
&lt;P&gt;This has now been changed as follows:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;The “Threat Emulation” blade is now displayed in the client UI as the “File Protection” blade. This better reflects the broader set of capabilities it includes that are related to detections on files, of which “Threat Emulation” is only one capability&lt;/LI&gt;
&lt;LI&gt;Within the “Advanced” policy settings for “Web &amp;amp;Files Protection” in “Threat Prevention Policy Settings” it is possibly to separately configure detection settings for each of the following:&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Threat Cloud Reputation&lt;/LI&gt;
&lt;LI&gt;Offline Reputation&lt;/LI&gt;
&lt;LI&gt;Static Analysis&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Office Files&lt;/LI&gt;
&lt;LI&gt;Executable Files&lt;/LI&gt;
&lt;LI&gt;DLL Files&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Other Enhancements: &lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Added ability to update Static Analysis models and Offline Reputation hash lists (OFR)OFR offline. Refer to&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180690" target="_blank"&gt;sk180690&lt;/A&gt; for more details as&amp;nbsp;to perform Offline Update.&lt;/LI&gt;
&lt;LI&gt;EPS-56719:&amp;nbsp; Improved the time it takes to upload events to threat hunting&lt;/LI&gt;
&lt;LI&gt;Full Disk Encryption (FDE)&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;PIV Smartcard driver now supports IDEmia Cosmo 8.1 cards and compressed certificates.&lt;/LI&gt;
&lt;LI&gt;Both the FDE classic Pre-boot and Smart Pre-boot flows are now refined to a smoother flow for visually impaired users.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;&lt;U&gt;Security Enhancements&lt;/U&gt;&lt;/STRONG&gt;:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;There are multiple security enhancements in this release including the following:&lt;/P&gt;
&lt;UL&gt;
&lt;UL&gt;
&lt;LI&gt;EPS-56439:&amp;nbsp; The detection of ransomware is now faster. Implemented a new mechanism that can potentially pause and prevent ransomware encryption from occurring in certain scenarios, particularly during the initial stages of an attack.&lt;/LI&gt;
&lt;LI&gt;Multiple enhancements to extended scope of behavioral indicators that can be created and improve their accuracy. This increases the coverage of distributed signatures&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;Please see &lt;A href="https://support.checkpoint.com/results/sk/sk182109" target="_blank"&gt;sk182109&lt;/A&gt; for the complete list of enhancements and resolved issues in this release&lt;/P&gt;
&lt;P&gt;Also please feel free to reach out to me directly for any further clarifications and / or information on Early Access (EA) programs. Early Access programs for semi-isolated networks are continuing&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jonny Rabinowitz&amp;nbsp;&lt;/STRONG&gt;| Harmony Endpoint Product Manager&lt;BR /&gt;&lt;STRONG&gt;Check Point Software Technologies Ltd.&lt;/STRONG&gt; | M +972.54.4970073 | &lt;A href="mailto:jonnyr@checkpoint.com" target="_blank"&gt;jonnyr@checkpoint.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 09:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/211941#M8535</guid>
      <dc:creator>JonnyRabinowitz</dc:creator>
      <dc:date>2024-04-22T09:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212148#M8557</link>
      <description>&lt;P&gt;Hello Jonny,&lt;/P&gt;&lt;P&gt;there are some very good enhancements in this version. However, we observe being unable to register clients to our DNS-Servers when this version is installed. Lookups work fine, though.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 09:28:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212148#M8557</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-04-24T09:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212149#M8558</link>
      <description>&lt;P&gt;Thanks for the feedback. Note this release includes analysis of DNS requests. Can you please check whether you have any anti-bit detections related to these DNS messages?&lt;/P&gt;
&lt;P&gt;====================================================================================================&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Anti-Bot Blade now includes DNS Inspection support, which utilizes Check Point Threat Cloud engines for the analysis of DNS traffic. This protection allows Anti-Bot to block access to malicious domains during the DNS resolution process. Existing Anti-Bot settings apply to the DNS detections as well&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 09:33:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212149#M8558</guid>
      <dc:creator>JonnyRabinowitz</dc:creator>
      <dc:date>2024-04-24T09:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212151#M8559</link>
      <description>&lt;P&gt;nothing in the logs.&lt;/P&gt;&lt;P&gt;If we disable Threat Prevention on the client we can register again, so it might be related to the current change in the Anti-Bot blade.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 10:01:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212151#M8559</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-04-24T10:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212153#M8561</link>
      <description>&lt;P&gt;sorry to hear that&lt;/P&gt;
&lt;P&gt;if internal to C P can you send coinfo collected during issue&lt;/P&gt;
&lt;P&gt;is customer can only recommend to open TAC case. If unicast me SR I will help to get it escalated&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 10:18:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212153#M8561</guid>
      <dc:creator>JonnyRabinowitz</dc:creator>
      <dc:date>2024-04-24T10:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212266#M8566</link>
      <description>&lt;P&gt;Issue has resolved itself. All systems can register again. ¯\_(ツ)_/¯&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 11:31:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212266#M8566</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-04-25T11:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Security Client E88.30 for Windows is now available as GA</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212267#M8567</link>
      <description>&lt;P&gt;Tested in my windows VM, very good so far.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 11:42:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Security-Client-E88-30-for-Windows-is-now/m-p/212267#M8567</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-25T11:42:52Z</dc:date>
    </item>
  </channel>
</rss>

