<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Genai and learning mode question in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254866#M333</link>
    <description>&lt;P&gt;Hello Val,&lt;/P&gt;&lt;P&gt;I actually did.&lt;BR /&gt;"Genai Protect" in the &lt;SPAN&gt;Harmony SaaS Administration Guide, as a preventive measure to regulate the usage of AI in the corporate environment is more or less a DLP solution.&lt;BR /&gt;&lt;BR /&gt;"Genai protection" in the Cloudguard WAF says define a custom rule in natural language and presents the standard rule options.&lt;BR /&gt;&lt;BR /&gt;The Cloud Guard WAF documentation has the Genai protection, as of now, not listed. Only the following options are available:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://waf-doc.inext.checkpoint.com/" target="_blank" rel="noopener"&gt;Documentation Overview | CloudGuard WAF&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Accept&lt;/STRONG&gt; - Traffic matching the exception's conditions will be accepted.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Drop&lt;/STRONG&gt; - Traffic matching the exception's conditions will be blocked.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Skip&lt;/STRONG&gt; - Relevant only for specific keys like "Parameter Name", "Parameter Value" and "Indicator". Allows skipping the value of the matching parameter from being inspected by the CloudGuard WAF engines. The rest of the traffic will be inspected for malicious behavior. Skip action is not supported with Scheme Validation.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Suppress Log&lt;/STRONG&gt; - Traffic matching the exception's condition will not activate their Log Trigger object/s upon event.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Aug 2025 08:32:09 GMT</pubDate>
    <dc:creator>Christoph</dc:creator>
    <dc:date>2025-08-11T08:32:09Z</dc:date>
    <item>
      <title>Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254700#M331</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;yesterday I enabled Tech Preview mode to check out a finding and turned it off after again.&lt;/P&gt;&lt;P&gt;Today I discovered a "Genai" rule option in the rule base. Idk if it's related to the enable/disable of the tech preview mode.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="07-08-2025_09-39-08.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31142i22EC6CF77197443F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="07-08-2025_09-39-08.png" alt="07-08-2025_09-39-08.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The rule builder itself look the same and I have no idea where to put my natural language (uri regex i.e.?). I cannot find any information about this. Is this documented anywhere?&lt;/P&gt;&lt;P&gt;Second question. I had some SQL injections in a password field yesterday. One of them was a "legit" password matching an SQL injection (partly, mostly a false positive) and two were SQL injections by myself to confirm the previous finding.&lt;BR /&gt;&lt;BR /&gt;Today I got the question, whether these 3 are malicious or benign requests, grouped together. Lets assume the first SQL injection was benign, the later malicious.&lt;BR /&gt;What should I answer, as I cannot split them up or should I not answer at all?&lt;BR /&gt;What are the consequences of flagging a malicious request as benign, in the short/medium/long term for the MLM?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Christoph&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Aug 2025 07:57:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254700#M331</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2025-08-07T07:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254850#M332</link>
      <description>&lt;P&gt;Did you try documentation?&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/SaaS-Admin-Guide/Content/Topics-SaaS-AG/GenAI-Protect-Dashboard.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/SaaS-Admin-Guide/Content/Topics-SaaS-AG/GenAI-Protect-Dashboard.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 07:21:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254850#M332</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-11T07:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254866#M333</link>
      <description>&lt;P&gt;Hello Val,&lt;/P&gt;&lt;P&gt;I actually did.&lt;BR /&gt;"Genai Protect" in the &lt;SPAN&gt;Harmony SaaS Administration Guide, as a preventive measure to regulate the usage of AI in the corporate environment is more or less a DLP solution.&lt;BR /&gt;&lt;BR /&gt;"Genai protection" in the Cloudguard WAF says define a custom rule in natural language and presents the standard rule options.&lt;BR /&gt;&lt;BR /&gt;The Cloud Guard WAF documentation has the Genai protection, as of now, not listed. Only the following options are available:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://waf-doc.inext.checkpoint.com/" target="_blank" rel="noopener"&gt;Documentation Overview | CloudGuard WAF&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Accept&lt;/STRONG&gt; - Traffic matching the exception's conditions will be accepted.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Drop&lt;/STRONG&gt; - Traffic matching the exception's conditions will be blocked.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Skip&lt;/STRONG&gt; - Relevant only for specific keys like "Parameter Name", "Parameter Value" and "Indicator". Allows skipping the value of the matching parameter from being inspected by the CloudGuard WAF engines. The rest of the traffic will be inspected for malicious behavior. Skip action is not supported with Scheme Validation.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;P class=""&gt;&lt;STRONG&gt;Suppress Log&lt;/STRONG&gt; - Traffic matching the exception's condition will not activate their Log Trigger object/s upon event.&lt;/P&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 08:32:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254866#M333</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2025-08-11T08:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254879#M334</link>
      <description>&lt;P&gt;What about the link I provided you with?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 10:09:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254879#M334</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-11T10:09:14Z</dc:date>
    </item>
    <item>
      <title>Re: Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254881#M335</link>
      <description>&lt;P&gt;I cannot find any information related to the Web Application Firewall in your link.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 10:10:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254881#M335</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2025-08-11T10:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Genai and learning mode question</title>
      <link>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254885#M336</link>
      <description>&lt;P&gt;Gotcha. Let me see what I can dig out&lt;/P&gt;</description>
      <pubDate>Mon, 11 Aug 2025 10:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/Genai-and-learning-mode-question/m-p/254885#M336</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-08-11T10:31:14Z</dc:date>
    </item>
  </channel>
</rss>

