Security Checkup Harmony Endpoint Yearly 2023 Final
Security Checkup Harmony Endpoint Yearly 2023 Final
Security Checkup Harmony Endpoint Yearly 2023 Final
HARMONY ENDPOINT Classification: [Restricted]ONLY for designated groups and individuals Check Point Software Technologies Ltd. © All rights reserved.
TABLE OF CONTENTS
Table of Contents
EXECUTIVE SUMMARY
KEY FINDINGS
MALWARE ATTACKS
HIGH RISK WEB ACCESS
COMPROMISED CREDENTIALS
HARMONY ENDPOINT
HARMONY ENDPOINT PROTECTION
ABOUT CHECK POINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 2
EXECUTIVE SUMMARY
0 Hosts were
encountered
3.9K exploit attack
Check Point’s Anti-Ransomware includes
Attacks were detected active threat prevention that detects and
quarantines detect and quarantine
Zero-days downloads present a unique ransomware attacks, and of course, the
count of old or new malware variant with ability to restore your files from routine
un-known anti-virus signature. backups.
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 3
Key Findings
KEY FINDINGS MALWARE ATTACKS
trojan Forensics 8
Showing only events with severity: Critical, High and Medium
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 5
KEY FINDINGS HOSTS
10.0.3.77
10.0.7.98
10.0.7.107
10.0.1.76
10.0.7.36
10.0.3.39
10.0.3.95
10.0.5.210
10.0.7.80
10.0.5.185
0 5 10 15 20 25 30 35 40 45 50 55 60 65
Threat Extraction
Extract potentially malicious content Content Removal
Forensics Extract
Gen.ML.SA Static File Analysis
10.0.1.138 Critical Threat Emulation Gen.SB.pdf File System Emulation Prevent
Zero Phishing gen.ba.phishing Phishing Detect
gen.urlf URL Filtering
URL Filtering
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 6
KEY FINDINGS MALWARES
Verified
Not Supported
Extracted
Oversized
Corrupted File
Trojan
behavioral
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 7
KEY FINDINGS MALICIOUS ACTIVITY
Detect
10.0.7.36 Critical 65
Prevent
Detect
10.0.7.98 Critical 54
Prevent
Detect
10.0.3.39 Critical 22
Prevent
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 8
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 9
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 10
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 11
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 12
KEY FINDINGS HIGH RISK WEB ACCESS
ACCESS TO HIGH RISK WEB SITES
Web use is ubiquitous in business today. But the constantly evolving nature of the web makes it extremely difficult to protect and enforce standards for web usage
in a corporate environment. To make matters more complicated, web traffic has evolved to include not only URL traffic, but embedded URLs and applications as
well. Identification of risky sites is more critical than ever. Access to the following risky sites was detected in your network, organized by category, number of users,
and number of hits.
Top high risk web sites (Top phishing attempts) Access to non-business websites or to sites
containing questionable content can expose an
Resource Time Source
organization to possible productivity loss,
http://10.0.1.110:8090/ Dec 7, 2023 6:35:57 PM 10.0.3.69 compliance and business continuity risks.
http://10.0.1.110:8090/ Dec 5, 2023 10:23:57 PM 10.0.3.133
No data found.
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 13
Harmony Endpoint
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 15
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 16
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 17
HARMONY ENDPOINT