Skip navigation
All Places >

Threat Prevention

Log in to follow, share, and participate in this community.

Recent Activity

Nicolas Daems
Hi,   Few months ago we developped a small hack in UserCheck in order to send an email and report wrongly categorized website to Helpdesk team.     Please find the way if you're looking for such feature (Compatible in R77.30 & R80.x)   UserCheck portal relies on a javascript library stored on the Gateway. Edit this files on the Gateways  vi… (Show more)
in Threat Prevention
Ed Eades
I have been doing some testing with the usercheck feature with antibot.  I have antibot enabled and setup with just a few test IPs for the scope and that is working well.  We would like to present the users with a block page if a device attempts to go to a known bot controlled site.  I tested some with using the usercheck on the firewall and also… (Show more)
in Threat Prevention
Neil Davey
When using R77.30 I use to have an IPS Profile that only protected the following IPS settings:   Protections, By Protocol, Application Intelligence, Peer to Peer & Malware Traffic Categories.   On a regular basis I would check both of these categories and if any new protections were downloaded, then I would manually enable these protections.  … (Show more)
in Threat Prevention
Dameon Welch Abernathy
The video streaming service Vevo has been breached, there's a .Net 0day in the wild, and beware of Bashware. All that and more in our latest Threat Intelligence Report.   Download: Threat Intelligence News 18 September 2017
in Threat Prevention
Dameon Welch Abernathy
6 million Instagram accounts were leaked and offered for sale, Turia APT is being used to spy on embassies, Hurricane Harvey and the IRS are being used to scam people, Real Madrid's Twitter account was hacked, and "Roboto Condensed" isn't font. Find about this and more in this week's threat intelligence report!   Download: Threat Intelligence… (Show more)
in Threat Prevention
Mike Painter
In short, it would be great if Check Point could interface with a vulnerability scanner to automatically configure IPS rules based off various parameters. Wishful thinking, perhaps?   For example, lets say anything with a CVSS of 1-4 is inactive, 5-7 is in detect, and 8-10 is protect. You could then run this against the Confidence and Performance… (Show more)
in Threat Prevention
Bobby Meador
Keep getting this on R80.10 gateways Azure and 5900 cluster same issue. Is this a BUG!!!   I have tried this and it does not work   "<Name of Security Gateway> has MTA enabled, but it is not in the scope of any of the Threat Prevention policy rul… 
in Threat Prevention
Deven Amode
We have two gateway clusters, Edge and Internal cluster, installed and have enabled anti-bot/virus features enabled on both, however, only the internal cluster policy shows the logs for anti-bot/virus.   No logs are shown in edge cluster policy. I have made sure that the features are both properly enabled, right policy is installed on the right… (Show more)
in Threat Prevention
Dameon Welch Abernathy
Game of Thrones is the lure of a new phishing campaign, telnet credentials for thousands of Internet of Things devices have leaked, "defray" is a new ransomware being used in targeted attacks, and yet more CIA-developed tools made public thanks to Wikileaks. Details on these items and more can be found in this week's Threat Intelligence report.  … (Show more)
in Threat Prevention
Dameon Welch Abernathy
More than 4,000 corporates were attacked, with at least 14 known successful infections, Chicago's entire voter database was left in the cloud and exposed to everyone for months, yet more malicious apps found in Google Play, and WannaCry appears to have impacted multiple service centers of LG Electronics. Details on these items and more can be… (Show more)
in Threat Prevention
Load more items