Check Point Harmony Endpoint's forensic capabilities provide detailed visibility into endpoint activity, enabling thorough investigation of security incidents. When a threat is detected, forensics automatically generates comprehensive reports showing the full attack chain. This guide covers enabling, configuring, and using forensic data collection.
Prerequisites
Before enabling forensics, ensure you have:
- Infinity Portal access with Policy Administrator permissions
- Harmony Endpoint license with forensic capabilities
- Deployed endpoints running supported client versions (E84.10+)
- Network connectivity for endpoints to upload forensic data
Understanding Harmony Endpoint Forensics
What Forensics Provides
Forensic data collection enables:
| Capability | Benefit |
|---|---|
| Attack chain visualization | See complete sequence of malicious activity |
| Process tree analysis | Understand parent/child process relationships |
| File operation tracking | Know what files were created, modified, deleted |
| Network connection logging | Identify C&C and data exfiltration |
| Registry change monitoring | Detect persistence mechanisms |
| User activity correlation | Link actions to user context |
How Forensics Works
Continuous Collection → Local Storage → Event Trigger → Analysis → Report Generation
- Continuous Collection: Agent monitors endpoint activity in real-time
- Local Storage: Data stored locally with configurable retention
- Event Trigger: Detection by Anti-Malware, Anti-Ransomware, or manual trigger
- Analysis: Check Point engines analyze collected data
- Report Generation: Detailed forensic report created in Infinity Portal
Enabling Forensic Data Collection
Step 1: Access Policy Settings
- Log in to the Infinity Portal at https://portal.checkpoint.com
- Navigate to Harmony Endpoint > Policy
- Go to Threat Prevention > Policy Capabilities
- Select the policy rule to configure (or create a new rule)
Step 2: Enable Forensics Capability
- In the Capabilities & Exclusions pane, find Forensics
- Set the operation mode:
- On: Full forensic collection enabled
- Off: Forensic collection disabled
- Click Save
Step 3: Configure Forensic Settings
Click the settings icon next to Forensics to configure:
Data Collection Depth:
- Full: Maximum data collection (recommended for security-critical endpoints)
- Standard: Balanced collection for typical endpoints
- Minimal: Reduced collection for performance-sensitive systems
Collection Scope:
- Process execution and command lines
- File system operations
- Network connections
- Registry modifications
- Loaded modules (DLLs)
- Injection attempts
Step 4: Enable Related Capabilities
For comprehensive forensics, also enable:
Anti-Ransomware:
- Find Anti-Ransomware in capabilities
- Set to Prevent mode
- Enable Behavioral Analysis
- Configure backup settings for file restoration
Behavioral Guard:
- Find Behavioral Guard in capabilities
- Set to Prevent mode
- Enable detection categories:
- Injection techniques
- Exploitation attempts
- Credential theft
- Lateral movement
Step 5: Install the Policy
- Click Save to preserve configuration
- Click Install Policy at the top of the page
- Confirm the installation
- Monitor deployment in policy installation log
Configuring Threat Hunting (EDR)
Threat Hunting complements forensics with proactive search capabilities.
Enable Threat Hunting
- In Policy Capabilities, click the Analysis & Remediation tab
- Set Enable Threat Hunting to On
- Configure retention period (default 7 days)
- Click Save & Install
Regional Requirements
Threat Hunting is supported in specific Infinity Portal regions:
- Verify your tenant is in a supported region
- Contact Check Point support if Threat Hunting is not available
Client Version Requirements
- Minimum endpoint client version: E84.10
- For full features: E86.00 or later
- Check client versions in Asset Management > Computers
Understanding Forensic Reports
Automatic Report Generation
Forensic reports are automatically generated when:
- Anti-Malware detects and blocks a threat
- Anti-Ransomware detects ransomware behavior
- Behavioral Guard detects suspicious activity
- Anti-Bot identifies C&C communication
- Threat Emulation detonates a malicious file
Report Components
Executive Summary:
- Detection type and severity
- Affected endpoint and user
- Key findings overview
- Recommended actions
Attack Timeline:
10:23:15 - User opens email attachment (invoice.doc)
10:23:17 - Word launches macro, spawns PowerShell
10:23:18 - PowerShell downloads payload from malicious.site
10:23:20 - Payload executes, creates persistence in registry
10:23:22 - Check Point detects and blocks C&C communication
Process Tree:
explorer.exe (user)
└── outlook.exe
└── winword.exe
└── powershell.exe [MALICIOUS]
└── payload.exe [BLOCKED]
Network Activity:
| Time | Process | Destination | Protocol | Data |
|---|---|---|---|---|
| 10:23:18 | powershell.exe | malicious.site:443 | HTTPS | 245 KB |
| 10:23:22 | payload.exe | c2.evil.com:443 | HTTPS | BLOCKED |
File Operations:
| Time | Operation | Path | Status |
|---|---|---|---|
| 10:23:19 | Create | C:\Users\user\AppData\Local\Temp\payload.exe | Created |
| 10:23:20 | Create | C:\ProgramData\malware.dll | BLOCKED |
Registry Changes:
| Time | Operation | Key | Value |
|---|---|---|---|
| 10:23:20 | Create | HKCU\Software\Microsoft\Windows\CurrentVersion\Run\malware | BLOCKED |
Indicators of Compromise (IOCs):
- File hashes (MD5, SHA1, SHA256)
- Network destinations (IPs, domains)
- Registry paths
- File paths
Accessing Forensic Reports
- Go to Logs & Events
- Filter for events with forensic data:
- Set filter: Has Forensic Report = Yes
- Click an event to view details
- Click View Forensic Report
- Report opens in a new tab
On-Demand Forensic Collection
Manually trigger forensic analysis when needed.
Trigger from Asset Management
- Go to Asset Management > Computers
- Select the endpoint to investigate
- Click Actions > Trigger Forensic Analysis
- Collection begins immediately
- Report available within minutes
Trigger from Threat Hunting
- Run a Threat Hunting query
- Identify suspicious activity
- Click on the affected endpoint
- Select Trigger Forensic Analysis
- Review generated report
Trigger for Specific IOC
Collect forensics when a specific indicator is accessed:
- In Threat Hunting, create a collection rule
- Specify trigger criteria:
- File path or hash
- Network destination
- Process name
- When matching activity occurs, forensics is collected
Optimizing Forensic Collection
Server Endpoints
For servers, balance forensic depth with performance:
- Enable Server Optimization in policy
- Consider Standard collection depth
- Exclude high-volume server processes
- Schedule intensive analysis during maintenance windows
VDI Environments
For virtual desktop infrastructure:
- Use persistent disk storage for forensic cache
- Configure appropriate collection depth
- Consider parent image exclusions
- Test performance impact before broad deployment
Low-Bandwidth Environments
For remote or low-bandwidth sites:
- Use Minimal collection depth
- Configure upload scheduling during off-peak hours
- Monitor bandwidth usage
- Consider local report generation where possible
Integrating Forensic Data
Export to SIEM
Send forensic events to your SIEM:
- Go to Settings > Integrations
- Configure syslog export:
- Server address and port
- Protocol (TCP, UDP, TLS)
- Format (CEF, LEEF, Syslog)
- Map forensic fields to SIEM schema
API Access
Access forensic data programmatically:
- Generate API key in Infinity Portal
- Use Check Point Management API
- Query forensic reports and events
- Integrate with SOAR platforms
MITRE ATT&CK Mapping
Forensic data is automatically mapped to MITRE ATT&CK:
- Access Threat Hunting > MITRE ATT&CK
- View techniques observed in forensic data
- Click techniques for detailed event information
- Use for threat intelligence and reporting
Troubleshooting Forensic Collection
No Forensic Data Available
Symptoms: Alerts appear but no forensic report.
Solutions:
- Verify Forensics is enabled in policy
- Check endpoint client version (E84.10+)
- Ensure endpoint has disk space for local storage
- Verify network connectivity to Infinity Portal
- Check if endpoint was online during incident
Incomplete Forensic Reports
Symptoms: Reports missing expected data.
Solutions:
- Verify collection depth settings
- Check if needed capabilities are enabled
- Ensure endpoint was online during entire attack
- Review exclusions that might hide activity
- Increase local storage retention if needed
Forensic Upload Failures
Symptoms: Local collection works but reports don't appear.
Solutions:
- Check network connectivity to Check Point cloud
- Verify firewall allows HTTPS to *.checkpoint.com
- Review proxy settings on endpoint
- Check Infinity Portal service status
- Contact Check Point support with agent logs
Performance Impact
Symptoms: Endpoints slow after enabling forensics.
Solutions:
- Reduce collection depth to Standard or Minimal
- Add exclusions for high-I/O applications
- Increase local storage allocation
- Review and optimize endpoint hardware
- Consider enabling only for high-risk endpoints
Best Practices Summary
| Practice | Recommendation |
|---|---|
| Collection depth | Full for critical systems, Standard for typical |
| Policy targeting | Enable forensics for all managed endpoints |
| Related capabilities | Enable Anti-Ransomware, Behavioral Guard |
| Retention | Balance storage with investigation needs |
| Integration | Export to SIEM for correlation |
| Testing | Validate reports with controlled tests |
| Documentation | Save important reports externally |
Next Steps
After enabling forensics:
- Test forensic collection with controlled malware sample
- Train security team on report interpretation
- Integrate with SIEM for centralized logging
- Create response procedures based on forensic findings
- Review reports regularly for threat trends
Additional Resources
- Harmony Endpoint Forensics Documentation
- sk164695 - ATRG: Harmony Endpoint Forensics and Anti-Ransomware
- Analysis & Remediation Guide
- Check Point Research Threat Intelligence
- Check Point CheckMates Community
Need help implementing Harmony Endpoint forensics? Inventive HQ provides expert Check Point deployment and security operations services. Contact us for a free consultation on maximizing your endpoint protection investment.