Harmony Endpoint Threat Extraction, Emulation and Anti-Exploit
R81 Harmony Endpoint Server Administration Guide|337
Harmony Endpoint Threat
Extraction, Emulation and Anti-
Exploit
Threat Emulation detects zero-day and unknown attacks. Files on the endpoint computer are
sent to a sandbox for emulation to detect evasive zero-day attacks.
Threat Extraction proactively protects users from malicious content. It quickly delivers safe
files while the original files are inspected for potential threats.
As part of the Threat Extraction and Threat Emulation solution, when the Harmony Endpoint
client is installed on a client computer, the Harmony Endpoint Browser Extension is also
installed on the Google Chrome browser. The Harmony Endpoint Browser Extension protects
against malicious files that come from internet sources.
See all Threat Extraction and Threat Emulation logs in SmartLog under Threat Emulation.
n
Logs related to files from the Harmony Endpoint Browser Extension show: Monitor Type
- Browser Extension and Browser - Chrome
n
Logs related to files from the computer show: Monitor Type - File Monitor
Configure the settings in the Harmony Endpoint Threat Extraction and Threat Emulation rule
of in the SmartEndpoint Policy tab.