<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Email alert for high risk device events to admin in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/Email-alert-for-high-risk-device-events-to-admin/m-p/39398#M190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to the &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2496-email-high-risk-alert-to-admin"&gt;Email alerts for critical dashboard events&lt;/A&gt; introduced in v2.61, the system can now email alerts for high risk device events to dashboard administrators as they occur.&lt;/P&gt;&lt;P&gt;These are the high risk events that are viewable on the Events &amp;amp; Alerts tab in the SandBlast Mobile Dashboard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="62555" class="image-3 jive-image" height="438" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62555_pastedImage_1.png" style="width: 844px; height: 435px;" width="850" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;High risk device events include any event that raises the device risk level to high, such as:&lt;/H3&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH&gt;Event type&lt;/TH&gt;&lt;TH&gt;Event&lt;/TH&gt;&lt;TH&gt;Examples&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Jailbroken/Rooted&lt;/TD&gt;&lt;TD&gt;Jailbroken/Rooted Device&lt;/TD&gt;&lt;TD&gt;Device is rooted; Device is Jailbroken&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Application&lt;/TD&gt;&lt;TD&gt;Malicious Application Installed or Removed&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Suspicious Behavior&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Profile&lt;/P&gt;&lt;P&gt;Provisioning Profile Added&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;malicious profile was detected&lt;/P&gt;&lt;P&gt;any provisioning profile added, does not indicate malicious intent&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Configuration&lt;/TD&gt;&lt;TD&gt;Suspicious Configuration&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;BlueBorne BT exploit attack&lt;/P&gt;&lt;P&gt;ARP Poisoning&lt;/P&gt;&lt;P&gt;Man-in-the-Middle attack&lt;/P&gt;&lt;P&gt;malicious system configuration change&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Profile (iOS)&lt;/TD&gt;&lt;TD&gt;Suspicious Profile&lt;/TD&gt;&lt;TD&gt;suspicious VPN or Wi-Fi/Proxy profile detected&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Attack&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SSL Stripping&lt;/P&gt;&lt;P&gt;SSL Interception (Basic)&lt;/P&gt;&lt;P&gt;SSL Interception (Advanced)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;Types of Man-in-the-Middle attacks&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Device&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SMS Phishing&lt;/P&gt;&lt;P&gt;Connectivity&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Malicious URL detected in SMS message&lt;/P&gt;&lt;P&gt;Device status changed to Active or Inactive&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;To enable email alerts:&lt;/H2&gt;&lt;OL&gt;&lt;LI&gt;Open the dashboard and click on the avatar icon&lt;/LI&gt;&lt;LI&gt;Click Edit.&lt;/LI&gt;&lt;LI&gt;Turn ON the ‘Email Alerts’.&lt;/LI&gt;&lt;LI&gt;Click Save.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG __jive_id="62129" alt="" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62129_email_alerts.png" style="width: 833px; height: 289px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Example of a high risk event email alert:&lt;/H2&gt;&lt;P&gt;&lt;IMG __jive_id="62503" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62503_pastedImage_1.png" style="width: 620px; height: 698px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #808080; background-color: #ffffff; border: 0px; font-size: 12px;"&gt;Originally introduced in &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2496-email-high-risk-alert-to-admin"&gt;v2.61&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #808080; background-color: #ffffff; border: 0px; font-size: 12px;"&gt;, and enhanced to include High Risk device events in v2.66.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jan 2018 21:43:16 GMT</pubDate>
    <dc:creator>Pamela_S__Lee</dc:creator>
    <dc:date>2018-01-17T21:43:16Z</dc:date>
    <item>
      <title>Email alert for high risk device events to admin</title>
      <link>https://community.checkpoint.com/t5/Mobile/Email-alert-for-high-risk-device-events-to-admin/m-p/39398#M190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to the &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2496-email-high-risk-alert-to-admin"&gt;Email alerts for critical dashboard events&lt;/A&gt; introduced in v2.61, the system can now email alerts for high risk device events to dashboard administrators as they occur.&lt;/P&gt;&lt;P&gt;These are the high risk events that are viewable on the Events &amp;amp; Alerts tab in the SandBlast Mobile Dashboard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="62555" class="image-3 jive-image" height="438" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62555_pastedImage_1.png" style="width: 844px; height: 435px;" width="850" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;High risk device events include any event that raises the device risk level to high, such as:&lt;/H3&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH&gt;Event type&lt;/TH&gt;&lt;TH&gt;Event&lt;/TH&gt;&lt;TH&gt;Examples&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Jailbroken/Rooted&lt;/TD&gt;&lt;TD&gt;Jailbroken/Rooted Device&lt;/TD&gt;&lt;TD&gt;Device is rooted; Device is Jailbroken&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Application&lt;/TD&gt;&lt;TD&gt;Malicious Application Installed or Removed&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Suspicious Behavior&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Profile&lt;/P&gt;&lt;P&gt;Provisioning Profile Added&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;malicious profile was detected&lt;/P&gt;&lt;P&gt;any provisioning profile added, does not indicate malicious intent&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Configuration&lt;/TD&gt;&lt;TD&gt;Suspicious Configuration&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;BlueBorne BT exploit attack&lt;/P&gt;&lt;P&gt;ARP Poisoning&lt;/P&gt;&lt;P&gt;Man-in-the-Middle attack&lt;/P&gt;&lt;P&gt;malicious system configuration change&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Profile (iOS)&lt;/TD&gt;&lt;TD&gt;Suspicious Profile&lt;/TD&gt;&lt;TD&gt;suspicious VPN or Wi-Fi/Proxy profile detected&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Network Attack&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SSL Stripping&lt;/P&gt;&lt;P&gt;SSL Interception (Basic)&lt;/P&gt;&lt;P&gt;SSL Interception (Advanced)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;Types of Man-in-the-Middle attacks&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Device&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SMS Phishing&lt;/P&gt;&lt;P&gt;Connectivity&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Malicious URL detected in SMS message&lt;/P&gt;&lt;P&gt;Device status changed to Active or Inactive&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;To enable email alerts:&lt;/H2&gt;&lt;OL&gt;&lt;LI&gt;Open the dashboard and click on the avatar icon&lt;/LI&gt;&lt;LI&gt;Click Edit.&lt;/LI&gt;&lt;LI&gt;Turn ON the ‘Email Alerts’.&lt;/LI&gt;&lt;LI&gt;Click Save.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;IMG __jive_id="62129" alt="" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62129_email_alerts.png" style="width: 833px; height: 289px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Example of a high risk event email alert:&lt;/H2&gt;&lt;P&gt;&lt;IMG __jive_id="62503" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62503_pastedImage_1.png" style="width: 620px; height: 698px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #808080; background-color: #ffffff; border: 0px; font-size: 12px;"&gt;Originally introduced in &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2496-email-high-risk-alert-to-admin"&gt;v2.61&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #808080; background-color: #ffffff; border: 0px; font-size: 12px;"&gt;, and enhanced to include High Risk device events in v2.66.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jan 2018 21:43:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/Email-alert-for-high-risk-device-events-to-admin/m-p/39398#M190</guid>
      <dc:creator>Pamela_S__Lee</dc:creator>
      <dc:date>2018-01-17T21:43:16Z</dc:date>
    </item>
  </channel>
</rss>

