<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Advanced Capabilities triggered by everything since today in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226701#M9331</link>
    <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;Unfortunately, I was rudely awakened today because apparently most of the msi and exe files on our devices were recognized as malicious by offline file reputation.&lt;BR /&gt;We have deactivated the Advanced Capabilities globally as a result, but the damage is still there.&lt;/P&gt;&lt;P&gt;Protection names are&lt;/P&gt;&lt;P&gt;Gen.Rep.lnk&lt;BR /&gt;Gen.Rep.msi&lt;BR /&gt;Gen.Rep.7z&lt;/P&gt;&lt;P&gt;and so on.&lt;/P&gt;&lt;P&gt;Anybody else? The files are definitely benign.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Sep 2024 07:01:57 GMT</pubDate>
    <dc:creator>cstueckrath</dc:creator>
    <dc:date>2024-09-16T07:01:57Z</dc:date>
    <item>
      <title>Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226701#M9331</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;Unfortunately, I was rudely awakened today because apparently most of the msi and exe files on our devices were recognized as malicious by offline file reputation.&lt;BR /&gt;We have deactivated the Advanced Capabilities globally as a result, but the damage is still there.&lt;/P&gt;&lt;P&gt;Protection names are&lt;/P&gt;&lt;P&gt;Gen.Rep.lnk&lt;BR /&gt;Gen.Rep.msi&lt;BR /&gt;Gen.Rep.7z&lt;/P&gt;&lt;P&gt;and so on.&lt;/P&gt;&lt;P&gt;Anybody else? The files are definitely benign.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 07:01:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226701#M9331</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-09-16T07:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226703#M9332</link>
      <description>&lt;P&gt;I believe TAC is aware of this issue but please report your specific instance so you can be kept up to date accordingly.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 07:07:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226703#M9332</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-09-16T07:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226708#M9333</link>
      <description>&lt;P&gt;Same here for a bunch of our clients.&amp;nbsp; Also seeing benign DNS requests blocked on the Endpoint.&amp;nbsp; Do have a high-sev ticket open with TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 08:07:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226708#M9333</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2024-09-16T08:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226710#M9335</link>
      <description>&lt;P&gt;Having the same issues, keepass, 7zip, visual studio, but also checkpoint own files are removed.&lt;/P&gt;&lt;P&gt;Our own tenant seems to be hit the hardest/earliest, but more customers with issues.&amp;nbsp;&lt;BR /&gt;not sure if its only 88.30+ or not&lt;/P&gt;&lt;P&gt;created a High severity ticket with TAC&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 08:24:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226710#M9335</guid>
      <dc:creator>jurgenvrieze</dc:creator>
      <dc:date>2024-09-16T08:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226712#M9336</link>
      <description>&lt;P&gt;TAC response:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;There have been several cases reported, and the issue has been internally escalated. We are actively looking into it to resolve the problem on the Threat Cloud. As a temporary workaround, we recommend applying a local exclusion.&lt;/P&gt;&lt;P&gt;Currently, this issue is occurring across all versions. The issue has been resolved in the cloud, and the team is in the process of cleaning up all affected files. I will keep you updated with the latest information&lt;/P&gt;&lt;P&gt;Best &amp;nbsp;regards&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 08:33:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226712#M9336</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-09-16T08:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226715#M9338</link>
      <description>&lt;P&gt;deactivating advanced capabilities solved the issue only for 88+ versions. some customers are still on 87.x. There I also put files threat emulation mode to detect instead of prevent.&lt;/P&gt;&lt;P&gt;this seems to work for now&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 09:00:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226715#M9338</guid>
      <dc:creator>jurgenvrieze</dc:creator>
      <dc:date>2024-09-16T09:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226732#M9340</link>
      <description>&lt;P&gt;Hi all, we are aware of the issue, and the task force is working on the resolution. The "bad" signature is identified and already removed from the ThreatCloud, and we are working on removing the offending hashes through all instances.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Whether you need assistance to roll back the file quarantine, please work with TAC.&lt;BR /&gt;&lt;BR /&gt;Incident Reference:&amp;nbsp;&lt;A href="https://status.checkpoint.com/incidents/cfns8zwtg6kd" target="_blank"&gt;https://status.checkpoint.com/incidents/cfns8zwtg6kd&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 12:18:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226732#M9340</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-16T12:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226733#M9341</link>
      <description>&lt;P&gt;The users can restore their own files.&lt;/P&gt;&lt;P&gt;We have had to ask the affected users to run Quarantine Management tool on the computer -&amp;nbsp;&lt;SPAN&gt;&lt;SPAN class=""&gt;"C:\Program Files (x86)\CheckPoint\Endpoint Security\Remediation\RemediationManagerUI.exe"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;They can restore the files from there.&lt;/P&gt;&lt;P&gt;You have to also give the user permissions to 'Allow users to restore items from quarantine' in the 'Anti-Ransomware, Behaviour Guard and Forensics' blade.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 11:20:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226733#M9341</guid>
      <dc:creator>Tom_CheckMate</dc:creator>
      <dc:date>2024-09-16T11:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226783#M9342</link>
      <description>&lt;P&gt;Not very happy about this.&lt;/P&gt;&lt;P&gt;I'm happy that TAC is aware of the issue, but handling this at scale is quite difficult with the fairly elementary quarantine tooling on Harmony EP.&lt;/P&gt;&lt;P&gt;Also not too happy with the speed at which this is remediated on the Threat Cloud site; currently we're still receiving tickets regarding removals of legitimate software (including CHKP software....).&lt;/P&gt;&lt;P&gt;Check Point really needs to polish up on these aspects of agent management; we need a better way to handle quarantine in these incidents (It's on the roadmap supposedly?), but most of all we need a way to handle signatures and protection packages used by features OTHER than Anti-Malware. If CHKP isn't doing a staging run before pushing out in general then at least let us do it internally..&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 13:06:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226783#M9342</guid>
      <dc:creator>Swiftyyyyy</dc:creator>
      <dc:date>2024-09-16T13:06:00Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226896#M9346</link>
      <description>&lt;P&gt;Yeah, so we've tried that, but unfortunately the users get an UAC prompt when they try to run&amp;nbsp;&lt;SPAN&gt;RemediationManagerUI.exe&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Our users are standard users without administrative privileges.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 09:39:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/226896#M9346</guid>
      <dc:creator>cstueckrath</dc:creator>
      <dc:date>2024-09-17T09:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Advanced Capabilities triggered by everything since today</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/227054#M9357</link>
      <description>&lt;P&gt;The issue should already be resolved in all environments.&lt;BR /&gt;&lt;BR /&gt;It is also documented in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182688" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk182688&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 08:28:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Advanced-Capabilities-triggered-by-everything-since-today/m-p/227054#M9357</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-18T08:28:00Z</dc:date>
    </item>
  </channel>
</rss>

