Harmony Endpoint Use Case - Check Point HARMONY R81 Administration Manual

Endpoint server
Table of Contents

Advertisement

Harmony Endpoint Use Case

Scenario: You see a Threat Emulation or Anti-Bot detection log. What can you do?
Recommendations:
1. From the Forensics, Threat Emulation, or Anti-Bot log, open the Forensics Analysis
Report.
2. Open the Remediation tab to see the components of the attack and how they were
treated.
3. Delete all files that were created by the attack.
4. Open the Business Impact tab to see files that might be affected.
5. Open the Entry Point tab to see the path of the attack. Update your security policy to
prevent similar attacks in the future.
R81 Harmony Endpoint Server Administration Guide      |      328
Harmony Endpoint Use Case

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the HARMONY R81 and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents

Save PDF