Reporte Harmony Endpoint
Reporte Harmony Endpoint
Reporte Harmony Endpoint
HARMONY ENDPOINT Classification: [Restricted]ONLY for designated groups and individuals Check Point Software Technologies Ltd. © All rights reserved.
TABLE OF CONTENTS
Table of Contents
EXECUTIVE SUMMARY
KEY FINDINGS
MALWARE ATTACKS
HIGH RISK WEB ACCESS
COMPROMISED CREDENTIALS
HARMONY ENDPOINT
HARMONY ENDPOINT PROTECTION
ABOUT CHECK POINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 2
EXECUTIVE SUMMARY
0 Hosts were
encountered
27.8K exploit attack
Check Point’s Anti-Ransomware includes
Attacks were detected active threat prevention that detects and
quarantines detect and quarantine
Zero-days downloads present a unique ransomware attacks, and of course, the
count of old or new malware variant with ability to restore your files from routine
un-known anti-virus signature. backups.
0 31 1.1K 86
Credentials leak Phishing attacks were High risk website Incidents of access to
events were encountered access incidents websites marked as
encountered non-compliance by the
policy
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 3
Key Findings
KEY FINDINGS MALWARE ATTACKS
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 5
KEY FINDINGS HOSTS
192.168.0.199
10.1.6.53
10.1.6.21
10.1.6.27
10.1.6.14
10.1.6.49
10.1.6.65
10.1.6.33
10.1.6.35
10.1.6.31
0 2 4 6 8 10 12 14 16 18 20 22 24 26
Threat Extraction
Content Removal Extract
Zero Phishing Extract potentially malicious content
10.2.1.6 Critical gen.ba.phishing Phishing Detect
Forensics Offline Reputation
Gen.Rep. Prevent
Threat Emulation File System Emulation
Threat Extraction
Content Removal
Zero Phishing Extract potentially malicious content Extract
gen.ba.phishing Phishing
10.1.6.73 Critical Forensics File Reputation Detect
Gen.Rep.7z
Threat Emulation PDM:Exploit.Win32.Generic Proactive Defense Monitor Prevent
Anti-Malware Protection
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 6
KEY FINDINGS MALWARES
Verified
Not Supported
Extracted
Oversized
Corrupted File
behavior
ransomware
Adware","Trojan","behavior
Adware","Bundler","Dealply","behavior","coreinstaller
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 7
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 8
KEY FINDINGS MALICIOUS ACTIVITY
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 9
KEY FINDINGS HIGH RISK WEB ACCESS
ACCESS TO HIGH RISK WEB SITES
Web use is ubiquitous in business today. But the constantly evolving nature of the web makes it extremely difficult to protect and enforce standards for web usage
in a corporate environment. To make matters more complicated, web traffic has evolved to include not only URL traffic, but embedded URLs and applications as
well. Identification of risky sites is more critical than ever. Access to the following risky sites was detected in your network, organized by category, number of users,
and number of hits.
Top high risk web sites (Top phishing attempts) Access to non-business websites or to sites
containing questionable content can expose an
Resource Time Source
organization to possible productivity loss,
https://devsimanfacturaweb.z21.web.core.windows.net/mar Aug 29, 2023 7:20:28 PM 10.1.6.74 compliance and business continuity risks.
isa
https://devsimanfacturaweb.z21.web.core.windows.net/mar Aug 29, 2023 4:36:20 PM 10.1.6.74
isa
Access to Questionable Sites
http://gasdelnorte.ddns.net:8383/controlgasfe/alta_direccio Category Hits
Aug 11, 2023 2:56:10 PM 172.25.176.1
n.aspx?op=2&id=26987&ss=5akcwkheq3giu20p0fejjsno
Gambling 61
https://masteredi-app-portalweb- Jul 24, 2023 5:35:24 PM 172.16.10.54
prod.azurewebsites.net/login/index?returnurl=%2f Media Streams, Illegal /
9
Questionable
https://masteredi-app-portalweb- Jul 24, 2023 5:35:11 PM 172.16.10.54
prod.azurewebsites.net/login/index?returnurl=%2f Sex, Pornography 4
https://masteredi-app-portalweb- Jul 24, 2023 5:33:19 PM 10.220.152.142
prod.azurewebsites.net/login/index?returnurl=%2f
No data found.
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 10
Harmony Endpoint
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 12
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 13
HARMONY ENDPOINT
©Check Point Software Technologies Ltd. All rights reserved. Classification: [Restricted] ONLY for designated groups and individuals Security Checkup - Threat Analysis Report 14
HARMONY ENDPOINT