Anti-Exploit now protects against the Windows Remote Desktop Protocol (RDP) vulnerability, as defined in CVE-2019-0708.
CVE-2019-0708: This represents a critical flaw found in the Remote Desktop Protocol of Windows allowing for either Remote Code Execution or Denial of Service attacks. Vulnerable systems protected by Anti-Exploit include Windows 7 SP1 and Windows 2008R2. To learn more, see sk154232
Note: Users who run SandBlast Agent with a third party Anti-Virus (AV) should be aware that Anti-Exploit is turned off in the presence of third party AVs. For this protection to be enabled, you must allow Anti-Exploit to work with third party AVs as detailed in sk154454.
Anti-Ransomware, Behavioral Guard and Forensics
Fixes an issue introduced in E80.96 that can lead to Forensic exclusions being ignored on reboot.
Fixes an issue so that the Backup and Restoration database does not grow beyond a certain limit.
Starting from E80.85, SandBlast Agent improves coverage of malicious threats by sending anonymized Incident related data to the Check Point Threat Cloud. This feature is turned on by default. For more information, including how to disable this feature, refer to sk129753.
To support SmartLog or SmartView Tracker reporting with Endpoint Security Clients for all supported servers (except R80.20), you must update the log schema. Follow instructions in sk106662.
Endpoint Security E80.97 Clients
E80.97 Endpoint Security Clients for Windows OS (Recommended)
A zip file that contains all package permutations listed below.
E80.97 Complete Endpoint Security Client for 32 bit systems