- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi,
In the past few weeks we released two monthly releases of Endpoint Security / SandBlast Agent version E80.89 & E80.90.
This newsletter will summarize the new features and enhancements delivered in these releases and will begin a new tradition of Endpoint security newsletters we will send upon each release in 2019.
We will be happy to hear feedbacks or any suggestions for improvements.
New Features:
Till today, upgrade to a new Endpoint client had a big impact on the company employees, requiring everyone to reboot their machines. To improve this experience, and make the deployment smoother, we removed the need to reboot during most upgrade and installation scenarios.
- Upgrades from E80.89 to later releases for most blades are supported without reboots.
Fileless attacks are a very fast growing breed of attacks that don't involve the saving of a malicious file on disk. These attacks utilize script applications provided by Microsoft Windows like PowerShell. In this release, we extend Behavioral Guard capabilities to protect against Fileless and PowerShell based attacks.
- Behavioral Guard now includes a multi-phase detection in order to overcome PowerShell obfuscation and encoding techniques.
- In addition, in Windows 10, Behavioral Guard integrates with Microsoft’s Anti-Malware Scan Interface (AMSI) to receive and analyze decoded scripts.
- On detection the script content will be visible in the Forensics report for further analysis.
As attacks evolve there is an ever greater need to be able to identify, classify and prioritize the attacks being mitigated on the endpoint. To that end, we have made changes to the Forensics report to better include and highlight reputation and attack data. This translates to tighter integration with Reputation and a redesigned Forensic Report with more emphasis on the attack details.
- Redesigned Overview screen with focus on attack details, type and name
- Redesigned General screen with more details on the trigger for the attack
- Malware Family name when present in both the overview and individual process details.
- The Tree and Tree-Timeline views were updated with navigational toolbars that enable the ability to more quickly find processes of interest.
- Many more changes are present, view the full release notes
Forensics is one of the most powerful EDR systems that exist today, however it does record a lot of data. This has led to I/O issues on a few machines. By analyzing the data collected over a two year period, we have identified records that do not need to be stored in order for the Forensic Report to be accurately generated.
- Reduced on average about 50% of file ops stored
- Reduced on average about 10% of registry ops stored.
- Boosted Forensics Analyzer performance on average by 20%.
We continue to strengthen our Anti-Exploit technology with protection from new attack vectors. Anti-Exploit relies on the fact that there are a limited number of methods that a vulnerability in a process can be exploited (like Return Oriented Programming) and includes protections for these methods. This provides automatic protection for new zero day attacks that exploit new vulnerabilities. By monitoring the exploit landscape, we have added another protection and enhanced our protections to cover a new application.
- Stack Pivoting protection – added protection for a new potential technique which involves an exploit attempting to create a fake stack from attacker controlled memory like a heap.
- MS Equation Editor protection - given the prevalence of attacks that are running on Equation Editor, we added it to our default protected processes.
Those releases also include many Improvements and Enhancements:
E80.90:
This feature is only available in Windows 10.
This can reduce the number of file operations stored by up to 30%.
The icons are now present when upgrading to E80.90.
This addition alone can reduce the number of file operations stored by up to 80% on some machines.
Now there should almost always be an Entry Point.
This prevents the deletion of the reports by Anti-Viruses looking for specific signatures found in the argument or script content.
On average, 10% of registry operations are now excluded.
E80.89:
o Forensics reports no longer show Anti-Bot in "detect" mode as having a "Blocked" status.
o Resolves a Forensics Analysis issue when incidents that include the Task Scheduler may add unrelated processes to the Forensics report.
o Resolves a Forensics analysis issue where some "riskware" processes are not properly followed and terminated.
o Forensics reports now include the Malware Family Name when available to the reputation section of a process.
o Resolves a rare Forensics analysis issue when an entry point jumps between different browsers incorrectly.
o The Forensic report's network view now shows entry point URLs and associated Domains.
o Enforces exclusions of Check Point signed process related file activity in the driver to improve Forensics performance.
o Resolved few cases where Threat Emulation file monitoring locked the file interfering with other application usage
o Improves Software Development Status reporting.
For more information about E80.90, refer to: Enterprise Endpoint Security E80.90 Windows Clients
For more information about E80.89, refer to: Enterprise Endpoint Security E80.89 Windows Clients
Please contact us if you encounter any issues. We are happy to hear from you at any time. Your feedback is valuable to us.
Thank you,
Gil Sasson
Endpoint Cyber Security Project Manager
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY