<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Automated Forensic Reports for Linux is now EA (Early Available) in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Automated-Forensic-Reports-for-Linux-is-now-EA-Early-Available/m-p/231952#M9630</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We are thrilled to announce the launch of Automated Forensic Investigations for Linux EA program.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Automated Forensics is enhancing protection by incriminating malicious processes and reverting their actions, starting with quarantining related files. This paves the way for further expansion to other entities from our threat-landscape-oriented roadmap in the future, such as daemons, cronjobs, and so on. It also allows the SOC analyst to better understand the flow of the attack and, by doing so, reduce the time to mitigation&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more info and participation, feel free to reach out to:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom Goldberg – Product Manager&lt;/P&gt;
&lt;P&gt;Shalom Kramer – R&amp;amp;D Lead&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 10:42:29 GMT</pubDate>
    <dc:creator>tomgo</dc:creator>
    <dc:date>2024-11-07T10:42:29Z</dc:date>
    <item>
      <title>Automated Forensic Reports for Linux is now EA (Early Available)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Automated-Forensic-Reports-for-Linux-is-now-EA-Early-Available/m-p/231952#M9630</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We are thrilled to announce the launch of Automated Forensic Investigations for Linux EA program.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Automated Forensics is enhancing protection by incriminating malicious processes and reverting their actions, starting with quarantining related files. This paves the way for further expansion to other entities from our threat-landscape-oriented roadmap in the future, such as daemons, cronjobs, and so on. It also allows the SOC analyst to better understand the flow of the attack and, by doing so, reduce the time to mitigation&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more info and participation, feel free to reach out to:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom Goldberg – Product Manager&lt;/P&gt;
&lt;P&gt;Shalom Kramer – R&amp;amp;D Lead&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 10:42:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Automated-Forensic-Reports-for-Linux-is-now-EA-Early-Available/m-p/231952#M9630</guid>
      <dc:creator>tomgo</dc:creator>
      <dc:date>2024-11-07T10:42:29Z</dc:date>
    </item>
  </channel>
</rss>

