Showing results for 
Search instead for 
Did you mean: 
Create a Post
Altor inside Endpoint Security Products 17 hours ago
views 66 4

Endpoint Security VPN Catalina

Hi!I have a problem with my Endpoint Security VPN.Yesterday updated to Catalina and now I cant use your VPN.I believe it is a problem with 32/64 versions.Can you tell me are you going to fix it somehow in nearest time?And I just cant delete your software or re-install it - it gives me "Bad CPU type in executable" when I use your uninstaller.So I'm finding myself in situation in which I cant delete or install your soft.
KV inside Endpoint Security Products yesterday
views 3654 9 1

Checkpoint endpoint VPN Windows 10 is not booting up after Monthly patches

Since the past 6 months we have been getting around 50-70 random computers every month not booting up after the pending reboot after installation of monthly patches from Microsoft. The computers get stuck at the HP logo (All of our computers are HP elitebook but different generations) with spinning wheel.After creating a windows dump file and analysing it with help from Microsoft, they have identified the problem to be the Checkpoint zone alarm firewall driver vsdatant.sys interfering with letting Microsoft drivers loading. As I have noticed the vsdatant.sys driver is loading at high priority at kernel stage and therefore blocking everything else.The problem started in October 2018, we used Windows 1803. Since then we have upgraded to 1809 and also upgraded the Checkpoint Endpoint VPN client to version E80.90 but the problem still exist.We are not able to recreate the problem, it affects random computers every month, one month a computer can install the patches and boot up after restart without problem other month same computer is failing. Troubleshooting this has not been easy.When booting in safe mode or disabling the vsdatant.sys file temporarly the computer boots up and finnishing up the patch installation. And then when we enable it we cant restart the computer without any isse.Does anyone else has or had the same problem or maybe someone can put us on the right direction to troubleshoot this?We created a ticket to Checkpoint and awaiting response. April patches just released and when deploying to a pilot group we already got one crashed computer so we are not confident enough to rollout the patches.Some more details:We are only using CheckPoint endpoint VPN on the computer and are using Windows defender as main firwall/antivirus. We had a working solution since Windows 7 where we never got any issue, after upgrading to Windows 10 we only upgraded the VPN client on the computers to a supported version for the specific Windows release, no change in config has been done on the server side. From my understanding that should not be necessary since the only policy that is downloaded to the client when using the VPN is just IP rules. However, my knowledge of the network part is limited... but since its working fine for so many computers and random computers are failing i dont think thats an issue. Worth mentioning is that we use UEFI, SecureBoot. Is Secureboot maybe causing this?Any help is much apreciated!

Noise Rule

Hi We are the running Endpoint Client with the Firewall blade enabled. When I go to Log Viewer, 99% of the logs is dropped multicast traffic from the Firewall blade.    This makes investigating the logs somewhat difficult as there are limited filtering options available. Most of the multicast traffic is LLMNR port 5355 tcp and SSDP port 1900 udp. I want to create a Noise Rule (i.e. Track to None) so this traffic does not appear in the logs. Is it ok to create a block rule only on the ports as below?  Note the source is Any  Can these ports be used by other services? And if they can then how would I create a Noisey Traffic Rule          
Peter1 inside Endpoint Security Products Wednesday
views 195 5 1

Endpoint E80.89 VPN client crashes on Mac OS Mojave

Hi there,After upgrade to Mac OS 10.14 the E80.71 client stopped working; so I upgraded to E80.89. However, as soon as I click on the client icon in the toolbar it crashes.I attach a log that was produced to the collect logs option (choosing this option immediately crashed the client).I've tried the obvious things (rebooting computer, installing on different user account, going back to E80.71, uninstalling and reinstalling etc.)Any help would be appreciated. 
ake_schmidi inside Endpoint Security Products Wednesday
views 1206 10

kernel panic macOS 10.15 Beta (19A526h) Catalina

Hello TogetherI have with the latest beta of macOS Catalina some kernel panics when macOS is starting up.Installed versions:Endpoint Security: E80.89macOS: 10.15 Beta (19A526h)Is there already a new version? Or does anyone have a workaround?
Andrea_Poiesi inside Endpoint Security Products Tuesday
views 16921 19 1

Endpoint client and Windows 10 1903

Hi everyone,has anyone tried to upgrade windows 10 to the 1903 version and install the endpoint client? in the release notes of ver 80.94 and 80.96 I see that it is not mentioned and does not seem to be supported yet. does anyone have feedback?
whiz8 inside Endpoint Security Products Tuesday
views 110

Smartendpoint R80.20 HA Pair

 I have an existing SmartEndpoint managing endpoint and I want to build HA pair. Once I build the HA pair, how do the endpoints know about the Standby SmartEndpoint? If the Active one is gone, how does the endpoint connect to standby since it uses IP addresses to connect to the active one? 
inside Endpoint Security Products Sunday
views 3036 6 4

Check Point Endpoint Security Client E80.89 for MAC is now available

E80.89 for macOS 10.14 Support is now available.This release includes stability and quality fixes. New FeaturesSupport for the Endpoint Security Clients on macOS Mojave (10.14)Support for SandBlast Agent previously only available on the Windows platform:Threat Emulation - Evasion resistant sandbox technology detects malicious behavior and prevents any imminent attack.As in Windows, the protection is available in 2 levels:Protection from files written to the file system.Inspection of files downloaded by Chrome using the Chrome browser extension to prevent malicious files from getting to the file system.Anti-Ransomware - Detects and quarantines the most evasive Ransomware variants.Google Chrome Extension with:Threat Extraction - Reconstructs downloaded file, delivering sanitized risk-free files to users in real time.Zero Phishing - Blocks deceptive phishing sites and alerts on password reuse in real-time.Full support for macOS 64-bit.Adds the ability for Remote Access to verify the integrity of the Endpoint Security Management where the Endpoint Security VPN clients connect.This ability exists in the Endpoint Security VPN client for Windows, and is now available for the Endpoint Security client for macOS. See sk108892.EnhancementsNative Encryption Management now supports mobile network users.Remote Access - Opens the default browser of the machine to register to hotspot. See sk131152 for more information on the E80.89 MAC release.
nicolas1984 inside Endpoint Security Products Saturday
views 212 4

Bridge mode with security gateway 3100 - Possible?

Dear community,I'm installing a new security appliance 3100 on one site of my company, that has 5 ports (eth1, ..., eth5).eth1 is connected to WAN with a public IP addresseth2 is connected to LAN with a private IP address and a DHCP server for LAN clients. is part of a VPN domain. Everything works well with this configuration.Now, as it's a very small site, I'd like to use eth3, eth4 & eth5 for my LAN network too, so I would not need to use an additional switch. I created a bridge called "br1" with IP address and added eth2 & eth3 as members.Since, I'm not able to do anything from eth2 or eth3. I can't get an IP address, I can't reach Internet (even with a static IP address). The SmartCenter logs have entry for dropped packets with reason "Missing OS route".My questions are:- Is this design really supported?- Do you have any idea about what could prevent this design from working?Thank you in advance for your suggestions.
gonianiwa inside Endpoint Security Products a week ago
views 194 1

Rule to block request if url contains IP address

Hello, I would like to block all request at checkpoint when user will use directly IP address to access websites. As i read about it, it requires to write proper regex for it, i tried to use the following regex, but checkpoint did not accept it. [0-9]+\.[0-9]+\.[0-9]+\.[0-9]
Alex_Gilis inside Endpoint Security Products a week ago
views 274 4 1

LDAPS and cloud-based Endpoint servers

Is there a procedure similar to sk84620 for cloud-based EPS running on can't realistically ask a customer to use LDAP for organization scanners in clear text over an Internet connection.
zaxonxp45 inside Endpoint Security Products a week ago
views 168 1

Mounting encrypted flash drive under Linux.

In our company we have USB flash drives which are encrypted by Endpoint Security software. If the USB is plugged in on normal computer then the content is the encrypted container and the windows executable which allows to access container by using special interface.So it is possible to access the content on Linux using a Wine emulator to run the software. I wonder if it would be possible to mount the container directly by the Linux system, so the content could be accessible by standard Linux tools (like the rsync, cp, mv, etc.)? Kind regards,Piotr 
TomShanti inside Endpoint Security Products a week ago
views 291 3

Using Hyper-V on Windows 10 with Endpoint Security/VPN

Hi,we are running a VM on Windows 10 with the Hyper-V hypervisor.Currently we have troubles which looks like the Endpoint Client´s VPN interferes with the local VM traffic.We have "route all traffic through VPN" enabled and as soon as the user connects to VPN the VMs are not reachable anymore.Any experience ?I know it worked fine with VMWare Workstation in the past.Regards TomPS: We do not have any desktop firewall rules in place other than "Allow all"
sharkbone inside Endpoint Security Products a week ago
views 307 11

Screenmirroring (Miracast) connection error

We have had the scenario where our Screen mirroring via Miracast or any other technology works only after uninstalling Checkpoint VPN/Firewall software from the affected client. Research shows that most third party VPN solutions identify WiFi Direct (the underlying technology for Miracast/screensharing) as a "Split Tunnel" connection and deem it a risk to security so they disable the functionality.Are there alternative workarounds to this instead of totally uninstalling Checkpoint in order to get this working? We can only keep Checkpoint as our endpoint security solution (vpn / firewall) if we find a permanent solution to this problem or else management will be forced to turn to another solution. Refer to this post
Marcus_Halmsjo inside Endpoint Security Products 2 weeks ago
views 186 1

Exception for Sandblast in E81.40

Hi,We upgraded to EPS version E81.40 and after this we have started to get reports from users that the sandblast browser plugin started scanning downloaded files from domains that we have in exception in the policy for sandblast.Is this a known problem or is there a change in feature i might have missed?