Integration with Third Party Anti-Virus Vendors
Forensics can use information from the Windows Event Log to monitor and analyze malware events from third party anti-virus vendors. Based on the Windows Event Log, Forensics can analyze attacks, terminate processes, delete or quarantine files, and do other attack Remediation.
You can enable or disable third party integration in SmartEndpoint A Check Point GUI application which connects to the Endpoint Security Management Server, to manage your Endpoint Security environment - to deploy, monitor and configure Endpoint Security clients and policies., from the Automatic Threat Analysis action. This works with most common vendors without manual configuration.
Note - Some third party vendors do not automatically send information to the Windows Event Log. To use third party vendor integration, make sure that your vendor is configured to send information to the Windows Event Log.
Events are detected when the client is online or offline.
To enable or disable Forensics Third Party Anti-Virus Vendor integration:
-
In a Harmony Endpoint Forensics and Remediation rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session., right-click the Automatic Threat Analysis Action and select Edit Shared Action.
-
In the bottom of the window, click Override confidence level per specific event.
The Confidence level for automatic response window opens.
-
In the Additional Events area, in the Third party row under Forensics Analysis -
-
Select Always to enable Third Party Anti-Virus
Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. Acronym: AV. Vendor integration.
-
Select Never to disable it.
-
-
Click OK.