Harmony Endpoint Threat Extraction, Emulation and Anti-Exploit

Threat Emulation detects zero-day and unknown attacks. Files on the endpoint computer are sent to a sandbox for emulation to detect evasive zero-day attacks.

Threat Extraction proactively protects users from malicious content. It quickly delivers safe files while the original files are inspected for potential threats.

Anti-Exploit protects against application threats that exploit memory vulnerabilities. Anti-Exploit protects widely targeted applications such as Microsoft Office, Adobe PDF Reader, Browsers, and Adobe Flash.

As part of the Threat Extraction and Threat Emulation solution, when the Harmony Endpoint client is installed on a client computer, the Harmony Endpoint Browser Extension is also installed on the Google Chrome browser. The Harmony Endpoint Browser Extension protects against malicious files that come from internet sources.

See all Threat Extraction and Threat Emulation logs in SmartLog under Threat Emulation.

  • Logs related to files from the Harmony Endpoint Browser Extension show: Monitor Type - Browser Extension and Browser - Chrome

  • Logs related to files from the computer show: Monitor Type - File Monitor

Configure the settings in the Harmony Endpoint Threat Extraction and Threat Emulation rule of in the SmartEndpoint Policy tab.