CP v1.02 SandBlast POC UserGuide
CP v1.02 SandBlast POC UserGuide
User Guide
[Classification: Restricted]
Check Point Copyright Notice
© 2019 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under
licensing restricting their use, copying, distribution, and decompilation. No part of this product or related
documentation may be reproduced in any form or by any means without prior written authorization of Check Point.
While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for
errors or omissions. This publication and features described herein are subject to change without notice.
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of
the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Third Party copyright notices for a list of relevant copyrights and third-party licenses.
Important Information
Latest Software
We recommend that you install the most recent software release to stay up-to-date with the latest
functional improvements, stability fixes, security enhancements and protection against new and
evolving attacks.
Certifications
For third party independent certification of Check Point products, see the Check Point
Certifications page.
For more about this release, see the v1.0 home page.
Feedback
Revision History
Date Description
Hands On .................................................................................................................................41
Troubleshooting .........................................................................................................................47
This document describes how to set up the POC evaluation process for the Check Point SandBlast Agent Zero-Day
Solution, an Endpoint protection product, and provides resources for each stage.
POC Objective
The POC helps you implement SandBlast Agent advanced Endpoint protection while meeting all key customer
requirements.
Solution Overview
Check Point SandBlast Agent provides advanced Zero-Day Protection capabilities to protect web browsers and
endpoints and leverages Check Point's industry-leading network protections. SandBlast Agent ensures complete real-
time coverage across threat vectors, letting your employees work safely from any location without compromising
their productivity. Threat Emulation allows you to emulate unknown files in a contained environment to detect
malicious behaviors and prevent infections, while Threat Extraction instantly provides sanitized risk-free files.
Anti-Ransomware protection stops ransomware in its tracks and automatically reverses the damage. This ensures that
your organization is protected against malicious extortion attacks that encrypt your business data and demand a
ransom payment for its retrieval. Zero Phishing proactively blocks access to new or unknown deceptive websites and
safeguards user credentials by preventing the use of corporate passwords on external websites. SandBlast Agent
captures forensics data with continuous collection of all relevant system events, and then provides actionable incident
analysis to quickly understand the complete attack lifecycle. With greater visibility as to the scope, damage, and
attack vectors, incident response teams can maximize productivity and minimize organizational exposure of sensitive
files.
§ Web downloads.
§ Content copied from removable storage devices.
§ Links or attachments in email messages.
§ Lateral movement of data and malware between systems on a network segment.
§ Infections delivered via encrypted content.
§ Full visibility by monitoring and recording all endpoint events, including files affected, processes launched,
system registry changes and network activity.
§ Viewing event reports, triggered from the gateway or endpoint itself, from a central location using
SmartEvent and SmartLog.
Third-party integration
§ Enhancing the detection capabilities of existing Anti-Virus products, enabling protection from advanced
threats and providing actionable incident analysis. When triggered by third-party solution, endpoint forensics
logs are analyzed to generate reports viewable in SmartEvent and SmartLog.
§ SandBlast Agent can be quickly deployed and all policies are managed centrally through SmartCenter.
§ The non-intrusive, low-overhead deployment utilizes a SandBlast remote sandbox running as a service–on
either the SandBlast Cloud or your own private appliances–resulting in minimal impact on local performance
and full compatibility with installed applications.
POC Stages
These are the main stages in the POC process:
"Initial Engagement" on page 9
§ Customer Presentation
§ Demo
§ RFP
§ On premise\Cloud
§ Logs
§ Forensics
§ Overview of outcome
Initial Engagement
Customer Presentation
The latest SandBlast Agent\Beyond the perimeter customer presentation as part of the “Basic Sales Toolkit” can be found
on the PartnerMap page:
https://usercenter.checkpoint.com/usercenter/portal/media-
type/html/role/usercenterUser/page/default.psml/js_pane/PartnerMapId,PartnerHomeId?pageUrl=/partners/resources/produ
cts/mobile-security/endpoint-security.html
Customer Demo
DemoPoint is a great resource for launching quick, real time demonstrations of the latest features and malware
attacks without the need to build and maintain environments. The DemoPoint Endpoint environment features a play-
by-play cookbook for presenting multiple prevention scenarios.
https://usercenter.checkpoint.com/usercenter/portal/media-
type/html/role/usercenterUser/page/default.psml/js_pane/ToolsId,cloudDemoEnvironments
2. Enter the details, and select Advanced Threat Prevention > SandBlast Agent:
DemoPoint SK page:
RFP/ RFI
To assist with customer RFPs / RFIs:
[email protected]
Expectations and Criteria
How will the product be tested?
Customer POCs can take many forms. However, the main focus at this point is to understand the testing method from
the most common methodologies, and configure the appropriate policy for each method:
Penetration Testing
Our main focus is to harden the policy in all Threat Prevention blades to increase the prevention / catch rate
over the potential false positives:
1. Anti-Malware is mandatory and must be enabled for any penetration testing. Third party signature Anti-Virus
can be used alongside SandBlast Agent, if Check Point's Anti-Malware blade is not chosen for the POC.
2. Behavioral Guard must be configured in aggressive rules mode so all experimental signatures can be enabled
in prevention mode. To perform the configuration, follow the instructions in sk130012 - SandBlast Agent
Behavioral Guard Advanced Configuration.
3. Use these profile settings to harden a SandBlast Agent Profile for Penetration Testing:
Anti-Ransomware Yes
automatic restore
Monitoring Enable
Detect exploited No
application and log
Limited Production Deployment
For production deployment, our aim is to provide maximum prevention while minimizing false positives and
user impact.
1. Remove any existing 3rd party Endpoint solution prior to the installation of SandBlast Agent. Keeping two
Endpoint protection products on the same client may result in prevention conflicts and degradation of
performance.
2. As Best Practice, we recommend a “Tuning Mode” period in which the environment's unique software and
network traffic is studied and used to create a custom exclusions list.
Use the following profile settings to tune a SandBlast Agent Profile for a Limited Production Deployment:
Anti-Ransomware Yes
automatic restore
Threat Extraction, Threat Web Download Files that can be extracted Emulate
Emulation and Anti- Protection and emulated original file
Exploit without
suspending
access
Monitoring Enable
Terminate exploited No
application and log
Lab setup:
Starting with R80.20, a pre-defined configuration is made for best practice and should reflect the actual production
configuration. (As documented in sk154052 - SandBlast Agent Best Practice Configuration).
The Success Criteria and Test Plan need to be clear prior to evaluating Check Point SandBlast Agent Zero-Day
Solution.
1 SandBlast Agent are deployed on properly patched and updated client stations or VMs.
# SandBlast Agent Prerequisite Remarks
2 Chrome and IE extension for making web downloads scrubbing are installed and
configured. (Firefox browser extension can be enabled be following sk160794).
3 Anti-Malware blades are enabled, configured and updated via the Endpoint Management
Server or external public servers.
4 For Penetration Testing - Behavioral Guard is enabled and configured for aggressive
detection per sk130012.
5 SandBlast Agent detection is tested through various attack vectors: WEB, Email,
Removable media.
The table below lists all product features and their expected performance.
Full Disk Encryption All volumes of the hard drive and hidden volumes are
automatically fully encrypted. This includes system files,
temporary files, and even deleted files.
Lock screen secured Users log on one time (SSO) for authentication to the
Authentication operating system, Full Disk Encryption, and other Endpoint
Security blades.
Lock screen secured The solution requires that only an authorized pre-boot user is
Authentication allowed to log into Windows.
Media Encryption For encrypted storage devices, the solution provides access
on computers without Media Encryption or when working
offline.
Port Protection The solution allows custom user message notifications when
connecting a device based on the scenario.
Storage Device Write All files that are defined as business related data must be
Access written to the encrypted storage. Non-business related data
can be saved to the device without encryption.
Anti-Malware If malware is detected, the solution isolates the files from the
OS, but does not permanently remove them. The user can
restore quarantined files, if they are not malicious.
Forensics Full Forensic incident reports with process execution trees are
Analysis generated for every detected malicious activity.
Forensics The solution can trigger a Forensics analysis based on 3rd party
Analysis malware detection.
Forensics The Forensics report lists reputation analysis on files and URLs
Analysis used during an attack.
Anti- The solution remediates and restores files that were encrypted
Ransomware during a ransomware attack.
SandBlast
Behavioral Guard The solution detects and prevents fileless attacks based on
scripting.
Anti-Bot Cloud threat intelligence resources are used for updates and
identification of zero-day C&C attacks.
Web download The solution must have scrubbing capabilities with no added
protection – Threat hardware. Potential malicious content such as scripts, macros
Extraction and active content are extracted from all incoming files.
Web download When scrubbing, the original file must be accessible by the
protection – Threat end user if it is found to be benign by the sandbox.
Extraction
Web browsing The solution detects zero-day phishing sites that request user
protection - Zero credentials even if unknown to reputation engines.
Phishing
Web browsing Corporate (protected domain) password reuse on none-
protection -Cooperate domain sites are detected and logged.
Password Reuse
Threat Emulation All files written on the file-system are monitored and
statically analyzed. If found as potentially malicious, the
files are emulated by sandboxing and quarantined if found as
malicious.
Logging
SmartEvent The solution must have the ability to generate visual reports.
Logging and Showcase affected process, affected registry keys and affected
Reporting files in the OS environment.
Logging and The solution should be able to log the C&C communication from
Reporting the emulated BOT file.
Installation and Deployment
When approaching the POC, we choose the type of server topology: On-Premise or Cloud based. With the
introduction of SandBlast Agent Cloud Management, we can recommend the solution to most of the POCs.
Client stations SandBlast Agent Windows OS Endpoint client stations, with relevant
platform updates and patches for SandBlast Agent installation.
Step Description
3 During the First Time Configuration Wizard, you must configure these settings:
3. In the Security Management GUI Clients window, configure the applicable allowed
computers:
Step Description
6 Click OK.
7 In the SmartConsole top left corner, click Menu > Install database.
9 Click Install.
10 Click OK.
For more information, see the R80.30 Endpoint Security Management Server Administration Guide.
1. For each new tenant, a new registration is needed with a unique account name. Email can be shared across
Infinity Portal accounts. Registration URL: https://portal.checkpoint.com/register/endpoint
2. Each account request is individually authorized by:
After you are registered and authorized, you receive an authorization email:
Step 2 of 4: Login to EndpointCloud Portal:
3. For multiple associated accounts in the Infinity portal , select the correct Profile:
1. To connect to the SmartEndpoint, a dedicated SmartConsole must be used. It is available via a downloadable
link in the portal:
Cloud Management:
SandBlast Agent Cloud Management evaluation license includes a 30-day trial (no need to generate one).
On premise:
Note - All licenses can be obtained from Check Point User Center > Winning the Security Market > Try Our
Products > Product Evaluation
Includes SmartEvent
§ Initial client - A lightweight client of approximately 20MB that pulls the installation data for needed
software blades from the management server.
§ Software blades package - This package includes the specified Software Blades to be installed on the
endpoint client.
Notes:
§ For Windows 7 OS, verify that the Windows host has the latest .NET installed, and Microsoft
§ HTTPS/Port 443 communication needs be allowed between the client deployed and the management server.
§ SandBlast Agent Cloud Management is updated with the latest recommended client versions.
§ See sk117536 for the latest Endpoint security clients downloads.
Instruction steps:
1. Open the SmartEndpoint and go to the Deployment tab > Actions > Load Client installer files.
2. Select the relevant EPS.msi files of the full package and initial package.
At the bottom of the GUI, select Manage Client Versions to check that the Initial Client version was
updated.
3. From the Initial Client window, click Download and follow the instructions to locally save the exported
initial client. The exported package already contains the IP information of Endpoint management.
4. Copy the exported Initial Client to the client machine and install it using administrative privileges from the
command line. You can also use system management software like SCCM to distribute the initial client (see
sk103395 - Best Practices - Endpoint Security (videos).
The Initial client pulls the installation package from the Endpoint management server and shows a message to
the user, to agree to start the installation.
5. Open the SmartEndpoint and go to the Overview tab. Monitor the client installation status from the Security
Status window.
4. Copy the Software Blades client to the client machine and install it using administrative privileges from the
command line. You can also use system management software like SCCM to distribute the initial client (see
sk103395 - Best Practices - Endpoint Security (videos)).
5. After the Software Blades client is installed, the client reboots automatically.
6. Open the SmartEndpoint and go to the Overview tab. Monitor the client installation status from the Security
Status window:
Integration with Active Directory
You can sync your organization Active Directory to Endpoint management. After it is synced, you can use any
Active Directory entry as the Applies To target (similar to destination) for Endpoint blades and deployment rules.
Note - Providing the Active Directory admin user access to the Deleted objects container is mandatory.
You can check following Microsoft KB for assistance.
3. Select Scan:
File-Based Scanner Limitations
§ The user accessing the SmartEndpoint must be part of the Active directory domain.
§ Each update in Active Directory must follow-up with a manual synchronization.
Hands On
This section focuses on how to use the SandBlast Agent to show Advanced Threat Prevention capabilities during a
POC.
CheckMe
CheckMe by Check Point is a proactive assessment that identifies security risks on your network, Endpoint, Cloud
and mobile environments. Based on this assessment, CheckMe instantly provides you with a detailed report that
shows if your environments are vulnerable to ransomware, zero day threats, malware infections, browser exploit, data
leakage and more.
For more information on the tool and tests use, refer to: sk115236.
http://www.cpcheckme.com/checkme/
2. Select Endpoint as Simulation Target, accept the user agreement and click Check Security Now:
VirusTotal is queried for .pdf, .doc and portable executable files detected as malicious by more than 10
Anti-Virus Engines, and then 300 known malware files are randomly selected (120 pdf, 120 exe, 60 doc) and
transformed into unknown malware files. New 300 unknown malware files are tested to simulate the reality of
a user downloading an infected file.
Sample Kit:
Note - SmartEvent is enabled and preconfigured when using SandBlast Agent Cloud Management.
1. Open the SmartConsole > Endpoint Management object > Management tab > checking both SmartEvent
Server and SmartEvent Correlation Unit:
On premise
Once SmartEvent is up, access the SmartView URL:
1. Use the dedicated SmartEvent Endpoint Cyber Attack View to centrally view and monitor all Endpoint cyber
security events:
https://help.checkpoint.com/s/create-new-sr
For technical questions or assistance in POCs, please use the CheckMates Endpoint community:
https://community.checkpoint.com/t5/Endpoint-Security-Products/bd-p/endpoint-general
Appendix A - Technical Specifications
SandBlast Agent - Packages
*Endpoint Compliance is provided with all Endpoint and SandBlast Agent packages.
§ MacOS Sierra 10.12.6, MacOS High Sierra 10.13.4 (Threat Emulation, Threat
Extraction, Anti-Ransomware, Chrome for Mac Browser Extension)
Threat Emulation – § Over 40 file types, including: Adobe PDF, Microsoft Word, Excel, and
Supported File Types PowerPoint, Executables (EXE, COM, SCR), Shockwave Flash –
SWF, Rich Text Format – RTF and Archives
Anti-Ransomware
Anti-Exploit
§ On detection, shuts down the exploited process and remediates the full
attack chain.
Behavioral Guard – Malicious behavior detection and protection
Behavioral Guard § Adaptively detects and blocks malware mutations according to their
real-time behavior.
Enforcement Modes § Detect and alert, Block (background & hold modes)
Anti-Bot
EndpointAnti-Virus
Forensics
Root Cause § Trace and identify root cause across multiple system restarts in real-time
Analysis
Malware Flow § Automatically generated interactive graphic model of the attack flow
Analysis
Full Attack § Automatically, by tracking back and remediating all events the attack caused
Chain before detection
Remediation
Management
IE11
extension
Left click
on Browser
extension
and click
again on
Collect
Logs.
Provide
URL that
caused the
issue.
Advanced -
> Collect
Contact
your local
SE.
Appendix C - Relevant SK Articles for
POC
§ sk106123 - File types supported by SandBlast Threat Emulation
§ sk101553 - Check Point Document Threat Extraction Technology
§ sk108695 - Check Point SandBlast Agent for Browsers
§ sk142732 - How to configure SandBlast Agent for Browsers with Web Extraction (R80.30 Gateway)