<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: USB scan in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/235046#M9761</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have read this and did not answer my question.&lt;/P&gt;&lt;P&gt;What I am asking is that if it is possible to access the USB after the deletion of the suspicious files&lt;/P&gt;</description>
    <pubDate>Mon, 09 Dec 2024 08:54:33 GMT</pubDate>
    <dc:creator>gmesaris</dc:creator>
    <dc:date>2024-12-09T08:54:33Z</dc:date>
    <item>
      <title>USB scan</title>
      <link>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/234565#M9741</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;We observed that in Checkpoint AV, when an external USB drive gets connected to the relevant computer, checkpoint scans the device automatically, if any malicious files are found, it deletes them immediately causing the USB device to become inaccessible.&lt;/P&gt;&lt;P&gt;Is it possible to have some options, what we would like to do with the file? (e.g.: Remove, Quarantine, Keep) and if we choose to delete the USB needs to remain accessible for the entire session.&lt;/P&gt;&lt;P&gt;We have a cloud installation with Infinity portal.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 09:07:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/234565#M9741</guid>
      <dc:creator>gmesaris</dc:creator>
      <dc:date>2024-12-04T09:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: USB scan</title>
      <link>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/234603#M9742</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Web-and-Files-Protection.htm?TocPath=Configuring%20Endpoint%20Policy%7CConfiguring%20the%20Threat%20Prevention%20Policy%7CWeb%20%26%20Files%20Protection%7C_____0#Files_Protection" target="_blank"&gt;https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Web-and-Files-Protection.htm?TocPath=Configuring%20Endpoint%20Policy%7CConfiguring%20the%20Threat%20Prevention%20Policy%7CWeb%20%26%20Files%20Protection%7C_____0#Files_Protection&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2024 14:17:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/234603#M9742</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-12-04T14:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: USB scan</title>
      <link>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/235046#M9761</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have read this and did not answer my question.&lt;/P&gt;&lt;P&gt;What I am asking is that if it is possible to access the USB after the deletion of the suspicious files&lt;/P&gt;</description>
      <pubDate>Mon, 09 Dec 2024 08:54:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/USB-scan/m-p/235046#M9761</guid>
      <dc:creator>gmesaris</dc:creator>
      <dc:date>2024-12-09T08:54:33Z</dc:date>
    </item>
  </channel>
</rss>

