cancel
Showing results for 
Search instead for 
Did you mean: 
Create a Post
ake_schmidi
ake_schmidi inside Endpoint Security Products 4 hours ago
views 2148 14

kernel panic macOS 10.15 Beta (19A526h) Catalina

Hello TogetherI have with the latest beta of macOS Catalina some kernel panics when macOS is starting up.Installed versions:Endpoint Security: E80.89macOS: 10.15 Beta (19A526h)Is there already a new version? Or does anyone have a workaround?
Jeff_Gao
Jeff_Gao inside Endpoint Security Products 11 hours ago
views 74 4

Endpoint Security client license is not available

Dear all        I have install endpoint client,but the client prompt "The Endpoint Security client license is not available.Contact your administrator",as follow: But i have install eval license and windows client also can connect to smartendpoint server.I also try update ,but can not update windows client can connect to smartendpoint server by 443.What is the reason?thanks!
DP3049
DP3049 inside Endpoint Security Products yesterday
views 36

Endpoint Security E80.89, OSX 10.15, no MFA challenge.

Hi Mates,I have Endpoint Security E80.89 running on MacBook Pro on OSX 10.15 (Catalina). When trying to connect via VPN to the corporate server, using Username and password authentication, I do not get the expected MFA challenge, nor do I get the SMS with the authenticate code. This worked on previous versions of both Endpoint Security and OSX, and currently works on my corporate Wintel laptop. I have disabled both firewall and Anti-virus for testing, no change.Any suggestions please?Kind regards,Dave.

Non-domain joined laptop & EPS installation - Failed to send register message to the server

We have half a dozen laptops that are not on the domain that we'd like to protect with EPS Client.I've created a Virtual Group on the Endpoint Server for Non Domain Joined Laptops & downloaded the package from the rule that associates the group.Installing on the Win 10 Home laptop is successful (running via CMD msiexec /i "DRIVE:\path_to_EPS.msi_file\EPS.msi" /l*v C:\EPS_install.log) but I've got the error message "Endpoint Security Client failed to send register message to the server. Contact your administrator".As the laptop is not on the domain it won't see the EPS server the same way all previously deployed clients have. Is there a way to point this non joined laptop to our server's external IP - or is there another way to get the laptop talking to the server?Thanks in advanced!

Media Encryption offline Encrypted file access without Checkpoint Agent Installed

Hi Team,GAIA OS: R80.30Endpoint Client: E81.40Blade Enable: Media EncryptionRefer Sk: sk148453We are testing media encryption on one of our customer environments.We successfully encrypted business data in the Pendrive but unable to access from the machine where checkpoint endpoint in not installed and also that machine is not a part of the current organization.So basically we are using Media Encryption Offline Access utility (called as AccessToBusinessData).As far I know once we encrypted the business data or nonbusiness data depend upon the policy that I configure, then we see an application called as Access To Business Data (Name with space) showing inside the Pendrive once the encrypted was completed.Also, I can download the Media Encryption Offline Access utility AccessToBusinessData (Name without space).I try to use both applications but got the below error.01020304Pls, help to find out the solution.Regards@Chinmaya_Naik   
Duane_Toler
Duane_Toler inside Endpoint Security Products a week ago
views 211 1

Native Encryption for Mac FDE

My customer has Endpoint Security server R77.30.03 plus the Native Encryption [for Mac FDE] hotfix, and the latest SmartConsole suite (the "E81.40 and higher"; the one linked even from the new E82.00 SK).  Even after cpstop/cpstart from the server hotfix, the Native Encryption menu options don't appear in SmarEndpoint! I *know* the server has the bits (I found the "fde_mac.jar" and related strings in the WSDL files courtesy of heavy grep'ing; heh).  I *know* SmartEndpoint has the bits because I see it when I open it in Demo mode.Regardless, when I connect SmartEndpoint to the server, the Native Encryption recovery options don't appear! Freaky... anyone else have this issue?
ritenm
ritenm inside Endpoint Security Products a week ago
views 187 1

Uninstallation error in R80.97

Facing error while uninstalling checkpoint security agent.Pl find attached file for your reference purpose.Kindly revert back. 
Ami_Barayev1
inside Endpoint Security Products 2 weeks ago
views 176
Employee+

Endpoint Security / SandBlast Agent Newsletter - Version – E82.00

Hi all,   We recently released SandBlast Agent E82.00! E82.00 introduces new features, stability and quality improvements. The complete list of improvements can be found in the version release’s Secure Knowledge sk163233   BitLocker Management from SmartEndpoint BitLocker is a very popular full volume encryption feature included with Microsoft Windows versions. Due to its popularity we have integrated the management of BitLocker into SmartEndpoint to ease its operation to our customers and enable single management experience for endpoint security services. BitLocker management is available for data protection license endpoints with Full Disk Encryption service enabled. Note that single encryption method is supported, either Check’s Point Full Disk Encryption or BitLocker with the ability to switch between the two using Crossgrade Functionality. More information is available at BitLocker Management Administration Guide.   BitLocker management requirements: Endpoint Operating System –  Windows 10 Pro and Enterprise editions E82.00 R80.30 with the BitLocker Management Hotfix sk163297           New Detection Techniques E82.00 introduces new enhancements to the Behavioral Guard to detect and prevent complex Meterpreter/reverse shell and RDP Brute Force attacks. Reverse shell attacks obtain control over a compromised system, an attacker usually aims to gain interactive shell access for arbitrary command execution which is very complex to detect.   The detections is currently deployed is silent mode and will be activated in a later stage.   Important Note: If you’re participating in a POC, security lab evaluation or penetration test of SandBlast Agent, please contact us to activate these detection enhancements as we know pen-testers love such attacks J   VPN's Post Disconnect FeatureThe post disconnect script feature allows users to run scripts on client computers after disconnections from gateways. Please refer to the Revision History of Remote Access for Windows Administration Guide.   Best Ami.B  
Andrea_Poiesi
Andrea_Poiesi inside Endpoint Security Products 2 weeks ago
views 19835 20 1

Endpoint client and Windows 10 1903

Hi everyone,has anyone tried to upgrade windows 10 to the 1903 version and install the endpoint client? in the release notes of ver 80.94 and 80.96 I see that it is not mentioned and does not seem to be supported yet. does anyone have feedback?
ritenm
ritenm inside Endpoint Security Products 2 weeks ago
views 215 2

Roaming user can't able to connect with endpoint management server

I am facing one issue for roaming user i.e checkpoint agent who is not connected in local LAN or MPLS network. showing disconnection so how to resolve this issue. Pl suggest asap.
cjoseph
cjoseph inside Endpoint Security Products 2 weeks ago
views 440 1

Data recovery from Check Point launch failure

I have a Windows 7 laptop with CheckPoint EndPoint Security full Disk Encryption v7.4.1618 and access to the .REC recovery key file.  CheckPoint creates a pink-to-blue band across the top of the screen and does not offer a login prompt. I attempted to reverse the encryption to get to the hard disk data by creating and using a recovery floppy boot disk using the .REC key file but the process claims it cannot find the volume information. Are there alternative methods to access the hard disk data and back it up?  There appears to be no hardware issues, diagnostic results are clear. 
tom_allen
tom_allen inside Endpoint Security Products 2 weeks ago
views 233 3

Exclude Registry keys

Is there a way to exclude registry keys from being scanned and or quarantined?
Soren_Kristense
Soren_Kristense inside Endpoint Security Products 3 weeks ago
views 212 1

Endpoint blades status

HiIs it possible to get status of the blades in the endpoint by a script on the endpoint?We need this as part of the software deployment on the clients.the script must run on the client it self.GreetingsSøren
Juan_Concepcion
Juan_Concepcion inside Endpoint Security Products 3 weeks ago
views 9311 22 6

EndPoint Security URL Filtering

URL Filtering for Endpoint Security.  Presently this is how it's accomplished which is daunting and unmanageable when is this slated to be fixed:Note: This procedure needs to be repeated after every URL filtering policy change.Configuring URL Filtering - One-computer deploymentTo prepare to deploy the URL Filtering blade as part of Endpoint Security clients:Install an R75.40 Security Gateway (R75.40 only). Can be a Virtual Machine.Connect with SmartDashboard to the Security Management Server.Open the R75.40 Security Gateway object properties.Enable the URL Filtering blade - click on OK.Go to the Application & URL Filtering tab - in the left tree, click on Policy - define the relevant rules.Install the security policy on the R75.40 Security Gateway.Connect to the command line on the Security Management Server.Log in to the Expert mode.Run one of these commands to fetch the URL Filtering into the Endpoint policy:[Expert@HostName:0]# eps_policy_fetcher fetchlocal -g <Name of Security Gateway object>For example, eps_policy_fetcher fetchlocal -g GW1[Expert@HostName:0]# eps_policy_fetcher fetchlocal -d $FWDIR/state/<Name of Security Gateway object>/FW1For example, eps_policy_fetcher fetchlocal -d $FWDIR/state/GW1/FW1/Connect with SmartEndpoint GUI to the Endpoint Security Server.Go to the Policy tab.In the URL Filtering rule, make sure that there is an indication that the Security Gateway policy is available for endpoints.Example: Configuring URL Filtering - Distributed deploymentTo prepare to deploy the URL Filtering blade as part of Endpoint Security clients:Connect with SmartDashboard to the Security Management Server.Open the R75.40 Security Gateway object properties.Note: Install an R75.40 Security Gateway (R75.40 only). Can be a Virtual Machine.Enable the URL Filtering blade - click on OK.Go to the Application & URL Filtering tab - in the left tree, click on Policy - define the relevant rules.Install the security policy on the R75.40 Security Gateway.Copy all the files from the $FWDIR/state/<Name of Security Gateway object>/FW1/ directory on the Security Management Server to the $FWDIR/state/__tmp/FW1/directory on the Endpoint Security Management Server.Important Note: If you copy these files via a Windows-based computer, then after transferring them to the Endpoint Security Management Server, it is necessary to run the following command:dos2unix $FWDIR/state/__tmp/FW1/*Connect to the command line on the Endpoint Management Server.Log in to the Expert mode.Run the following command to fetch the URL Filtering into the Endpoint policy:[Expert@HostName:0]# eps_policy_fetcher fetchlocal -d $FWDIR/state/__tmp/FW1Connect with SmartEndpoint GUI to the Endpoint Security Server.Go to the Policy tab.In the URL Filtering rule, make sure that there is an indication that the Security Gateway policy is available for endpoints.
Altor
Altor inside Endpoint Security Products 3 weeks ago
views 1452 10

Endpoint Security VPN Catalina

Hi!I have a problem with my Endpoint Security VPN.Yesterday updated to Catalina and now I cant use your VPN.I believe it is a problem with 32/64 versions.Can you tell me are you going to fix it somehow in nearest time?And I just cant delete your software or re-install it - it gives me "Bad CPU type in executable" when I use your uninstaller.So I'm finding myself in situation in which I cant delete or install your soft.