- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
Bridge the CAASM Gap
with Exposure Management
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi,
Check Point Harmony Endpoint Security Client E89.10 for Windows is now available as GA (General Availability).
Main Enhancements:
Performance & Stability:
General performance and stability improvements across Anti-Bot, URL Filtering, Anti-Malware, and Threat Emulation Blades for a faster and more efficient user experience.
End of Support:
Please feel free to reach out with any questions!
The issue turned out to be correlated with Harmony SASE. When the SASE connection was on, laptops could not retrieve malware updates.
SASE comes with a default bypass rule for Check Point Harmony domains, but it needs to be updated to include teadv.checkpoint.com
After adding that domain, 89.10 updates are working correctly for us.
Will install it tomorrow in the lab and update.
Just installed it in the lab, so far, all good!
Hey @BarYassure Happy holidays to you and family, be well.
One of our customers experienced complete disconnection of all clients to the Infinity EDR service, regardless of location, behind a firewall or not.
For those facing the issue, consider sk183612 - Hardening certificate validation in Harmony Endpoint for Windows E89.10, which immediately solved the issue.
Goot to know Alex!
We have a problem here. Regarding the environment that uses WSUS, I don't know if Windows Update updates certificates. I believe we can use PowerShell to include this certificate chain in the clients. I'll test it and let you know here in the group.
Might be worth TAC case to verify. I tested in the lab, connected to client's site, worked fine.
All our pilot users upgraded to 89.10 have experienced the same issue: definition updates fail following the update until a manual "update now" from the HEP client followed by a reboot.
Until both those things (and not just a reboot) malware definition updates don't happen. The log doesn't show any failures, just an absence of Update events.
I'm stopping the rollout of 89.10 until we can figure out a way to correct this issue.
I believe this problem is related to a version of Windows that lacks the certificate chain.
https://support.checkpoint.com/results/sk/sk183612
Which version of Windows are you using?
All the computers in my pilot group are running Windows 11 25H2, and are fully up-to-date with Microsoft updates.
Unlike the SK description, these computers are not cut off from other Check Point services.
The SK has nothing to do with access to Check Point services, but instead installing a certificate in the trusted store.
In our case, this fixed the issues on all computers.
The issue turned out to be correlated with Harmony SASE. When the SASE connection was on, laptops could not retrieve malware updates.
SASE comes with a default bypass rule for Check Point Harmony domains, but it needs to be updated to include teadv.checkpoint.com
After adding that domain, 89.10 updates are working correctly for us.
I was disappointed to find that it is still necessary to use a Registry Hack to force the Windows Remote Access VPN Client to use IKEv2, rather than IKEv1.
The Capsule Connect for iOS client has no such restrictions and can use IKEv2 if it is available on the Security Gateway and falls back to IKEv1 if it’s not. Why can’t the Windows client work in exactly the same way?
Also, the setting is misleading because if IKEv2 is enabled, a fallback connection using IKEv1 is not possible. It’s not clear from the SK article that enabling IKEv2 support, disables IKEv1.
At CPX 2025 (Vienna) in February 2025, I discussed this issue and I was told the Registry Hack requirement would be removed ‘soon’. But it’s still a requirement in the latest, recommended release.
Is there in timeline on this - is it definitely on the roadmap to make this behave transparent in the Windows Client as it is in Capsule Connect?
The SK should definitely note this fact about IKEv2 disabling IKEv1...I'll ask that it be updated.
Thanks - but when will the requirement to use this Registry hack to enable IKEv2 be removed?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY