Static File Analysis is a new prevention technology based on Machine Learning.
The technology inspects hundreds of static features on executables created on the endpoint and uses a machine learning model to deliver a verdict.
The technology has a high detection rate and an extremely low false-positive rate. It is fast and it can reach a verdict in a few tens of milliseconds.
The impact on performance is negligible.
Mitre ATT&CKTM Matrix is now supported in Forensics. After an incident has been analyzed, Mitre ATT&CK techniques and tactics are identified and shown in the report.
Overview screen now shows the ATT&CK matrix.
Dedicated ATT&CK matrix screen in Suspicious Events Menu.
Dedicated view for all events from a technique including a description of the technique taken from Mitre.
Mapping of some Suspicious events that are not categorized by Mitre into Mitre tactics.
Anti-Exploit is now detecting on DejaBlue CVEs (CVE-2019-1181) for Windows 10 machines.
DejaBlue represents a new set of Remote Code Execution exploits similar to that of BlueKeep.
Remote Desktop Protocol identification in Behavioral Guard and Forensics.
Forensic reports now highlight if an incident start can be traced to a user who was logged in remotely.
When available remote machine name and IP will also be shown in the General screen.
If the remote connection was made from inside or outside the network is also available in the Overview screen.
Privilege Escalation identification in Behavioral Guard and Forensics.
Forensic reports now highlight privilege escalation.
Process integrity levels have been added to the Process Security tab in the Incident Details view.
Injection identification in Behavioral Guard and Forensics.
Forensic reports now showcase and highlight injections that happen during an incident.
Multiple injection detection rules have been developed. These will be enabled via automatic update once enough telemetry is available.
Improves the running status detection of Windows Defender.
Fixes Anti-Malware system scan error when scanning nested archives.
Reduces Anti-Bot's false positives significantly with better classification of the detections. This reduction does not affect Anti-Bot's detection rate.
Anti-Ransomware, Behavioral Guard and Forensics
Improves Behavioral Guard performance by optimizing log creation.
Anti-Ransomware backup exclusions that are removed from the policy are now being enforced correctly and do not require a reboot.
Turning Anti-Ransomware off and on now correctly creates the honeypot folders.
Honeypots deleted and in the recycle bin are no longer monitored by Anti-Ransomware.
Improves Forensic algorithm to find all executions of the identified execution root if it is not trusted. This ensures that all instances of a malicious process are detected.
Forensics Reports now highlight Mitre ATT&CKTM Tactics and Techniques. The Mitre ATT&CKTM matrix has its own screen and shows in the overview.
Injections are now monitored in the Forensic Report. These are the changes and enhancements:
The attack start is not a process that was injected into if the injecting process is also part of the incident.
The Incident Details Tree and Tree-Timeline views now show all injection links.
Processes injected into now show up after the process creation time of the process starting the injection.
Forensics now calculates Process Integrity levels. This allows us to see privilege escalation in Forensic Reports. The Process Security Tab in Incident Details shows the integrity level.
Forensics reports now show if the user who was connected at the start of an incident was connected remotely. In the case of RDP, the machine name and the IP shows as well.
Adds new Overview screen slider in to switch between Mitre ATT&CKTM, Network Map and Execution Tree screens.
Adds new default exclusions for taskhost.exe and taskhostw.exe to improve Forensics performance.
Suspicious events and Mitre ATT&CKTM techniques will no longer treat 'deleted file' events similar to 'create' and 'modification' events. This reduces the occurrence of miss-classified events or techniques.
The Incident Details screen now opens correctly in response to a click on the process tree in the Forensics Overview screen.
When the Forensic report is viewed in smaller resolutions, the MD5 value in the General screen may cut off. A new tool-tip was added to show the entire MD5.
Forensic reports no longer scale infinitely with the display size. The max width and height is now 2560 x 1600 pixels.
Process argument strings in Forensics reports are now encoded so that Anti-Malware does not detect on them.
Attempting to open a Forensics report prior to the analysis completion will now correctly show an in-progress page.
Media Encryption and Port Protection
Enables copying of Alternate Data Streams (ADS) over NTFS together with the original filename to a removable drive upon user consent.
Resolves Authorization scan error "Internal scanner error" when scanning a USB device with McAfee AV.
Fixes the code so that using wildcards for custom settings in device exceptions now accepts the wildcards in any position of the string.
Threat Emulation and Anti-Exploit
Improves Threat Emulation performance significantly. The number of I/O operations and the CPU consumption are greatly reduced.
Firewall and Application Control
Fixes a rare race condition that might result in a BSOD during process termination.
Fixes an issue when MSI upgrade logs are not collected on the Czech version of Windows.
Browser extension logs for TAC requests are now included when the user creates regular CPInfo logs.
SandBlast Agent can now work in front of Private ThreatCloud instead of Checkpoint ThreatCloud. This is useful for customers who have isolated environments that do not connect to Checkpoint ThreatCloud.
Starting from E80.85, SandBlast Agent improves coverage of malicious threats by sending anonymized Incident related data to the Check Point Threat Cloud. This feature is turned on by default. For more information, including how to disable this feature, refer to sk129753.
To support SmartLog or SmartView Tracker reporting with Endpoint Security Clients for all supported servers (except R80.20), you must update the log schema. Follow instructions in sk106662.
Endpoint Security E81.40 Clients
E81.40 Endpoint Security Clients for Windows OS (Recommended)
A zip file that contains all package permutations listed below.
E81.40 Complete Endpoint Security Client for 32 bit systems