Monitoring And Exclusions - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Monitoring and Exclusions

Define which processes are monitored by the Forensics component.
In the default monitoring settings, processes with certificates from some trusted companies
are excluded.
You can Add, Edit, and Remove exclusions from the list.
To exclude a process from monitoring:
1. From a Harmony Endpoint Forensics and Anti-Ransomware rule in the Policy, right-click
the Monitoring and Exclusions action and select Edit Shared Action.
2. Click Add exclusion.
3. In the window that opens select:
n
Process - To exclude an executable. You can also include Certificate information.
In Process name, enter the name of the executable.
l
Optional: Enter more information in the fields shown Signer is the company
l
that signs the certificate. The more information you enter, the more specified
the exclusion will be.
n
Certificate - To exclude processes based on the company that signs the certificate,
for example, Google.
In Certificate Data, enter a name of company that signs certificates, or
l
browse to add a certificate file.
4. Click OK.
5. The exclusion is added to the Exclusions list.
R81 Harmony Endpoint Server Administration Guide      |      314
Monitoring and Exclusions

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF