<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CP CME: Using CME to deploy a shared Threat Prevention Profile in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/191496#M475</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate your feedback, we are reviewing the suggested feature and will consider adding it to our roadmap&lt;BR /&gt;Thanks,&lt;BR /&gt;Roman&lt;/P&gt;</description>
    <pubDate>Mon, 04 Sep 2023 14:00:01 GMT</pubDate>
    <dc:creator>Roman_Kats</dc:creator>
    <dc:date>2023-09-04T14:00:01Z</dc:date>
    <item>
      <title>CP CME: Using CME to deploy a shared Threat Prevention Profile</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/174551#M472</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am today using CP Cloud Management Extention (CP CME) to deploy scale sets in Azure.&lt;BR /&gt;MDS as management in HA setup.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;If I need to automate new Cloudguard scale set with both security policy and threat prevention policy then how should that be done?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Should I include a line in the custom script as shown in the below extract of the json file (/home/admin/cg-script.sh) using mgmt_cli to install policy (threat prevention policy) afterwards and solve it by doing so?&lt;/P&gt;&lt;P&gt;The autoprovison.json file which is auto generated by the tool delivered with CME called autoprov_cfg only allows me to install a security policy and with that it will also install the standard threat prevention policy. In my case have no rule enabled at all to inspect traffic for known and unknown vulnerabilities. The help details to "autoprov_cfg add template -h" suggest using the restrictive policy with '-rp' parameter but it states: "&lt;STRONG&gt;Created to avoid a limitation in which&amp;nbsp;Access Policy and Threat Prevention Policy cannot be&amp;nbsp;installed at the first time together&lt;/STRONG&gt;"&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Eg. of the configuration file used by CME.&amp;nbsp;Extract of the json file - auto genereated by&amp;nbsp;autoprov_cfg tool.&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;},&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"tnPROD": {&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"anti-bot": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"anti-virus": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"application-control": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"custom-gateway-script": "/home/admin/cg-script.sh",&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"generation": "3",&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"identity-awareness": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"ips": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"one-time-password": "one-time-password",&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"policy": "Northbound",&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"send-logs-to-server": "SMEserver1",&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"url-filtering": true,&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;"version": "R81.10"&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;}&lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;Because I have more Azure environment I am using the same Threat Prevention profile with just different source and destination in the TP rulebase.&lt;/P&gt;&lt;P&gt;When I deploy new scale sets I want to make sure automatically to deploy this shared TP policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was recommended to look at MDS Global Assignment for managing this but might also introduce other challenges.&lt;/P&gt;&lt;P&gt;Therefore are there any ways of using the custom script defined in the autoprov_cfg tool were I could deploy the shared threat prevention policy using the API using MGMT_CLI to install it?&lt;/P&gt;&lt;P&gt;Eg. using mgmt_cli installing Northbound policy together with TP policy&lt;/P&gt;&lt;PRE&gt;mgmt_cli install-policy policy-package "Northbound" access true threat-prevention true targets.1 "corporate-gateway" targets.2 "corporate-gateway1" targets.3 "corporate-gateway2&amp;nbsp;" --version 1.1 --format json&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;/Kim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 12:54:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/174551#M472</guid>
      <dc:creator>Moberg</dc:creator>
      <dc:date>2023-03-13T12:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: CP CME: Using CME to deploy a shared Threat Prevention Profile</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/174639#M473</link>
      <description>&lt;P&gt;The shared TP profile must be added to the relevant policy package before the policy installation takes place.&lt;BR /&gt;I presume this can be done with set package, publish, then install the relevant policy package.&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/set-package~v1.9%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/set-package~v1.9%20&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 17:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/174639#M473</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-13T17:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: CP CME: Using CME to deploy a shared Threat Prevention Profile</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/191314#M474</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6318"&gt;@Roman_Kats&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have you considered to add the feature to CME to be using a shared Threat Prevention Profile in the CME templates?&lt;BR /&gt;&lt;BR /&gt;Like you are specifying "-po" for "policy to installed" and it just takes that security policies Threat Prevention Policy to install. Example could be to specify "-tp" for specifying the standard/shared Threat Prevention policy.&lt;/P&gt;&lt;P&gt;If you have multiple scale sets in the cloud eg. in Azure to represent different environments like DEV, QA/TEST, PROD, one need to maintain all three Threat Prevention policies in each Security Policy.&lt;/P&gt;&lt;P&gt;It gets more complicated when moving into other regions with other Azure VMSS Scale Sets. The you need to maintain those as well.&lt;/P&gt;&lt;P&gt;On our on-premise MDs domain we can share the Threat Prevention policy across datacenters, and that is what we want do across Azure VMSS scale sets with our Cloudguards installed in different environments and regions.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2023 07:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/191314#M474</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2023-09-01T07:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: CP CME: Using CME to deploy a shared Threat Prevention Profile</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/191496#M475</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9262"&gt;@Kim_Moberg&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate your feedback, we are reviewing the suggested feature and will consider adding it to our roadmap&lt;BR /&gt;Thanks,&lt;BR /&gt;Roman&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2023 14:00:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/191496#M475</guid>
      <dc:creator>Roman_Kats</dc:creator>
      <dc:date>2023-09-04T14:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: CP CME: Using CME to deploy a shared Threat Prevention Profile</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/194113#M4324</link>
      <description>&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;That could be a way but I am having 7 VMSS scale sets with different gateway names with 2 instances per set that can scale out..approx. maximum 8x 7 is the amount of gateways.&lt;/P&gt;&lt;P&gt;Basically CME script should have an option like either to use standard policy own threat prevention policy or to use a shared threat prevention policy. One just enter the name and that one is being deployed.&lt;/P&gt;&lt;P&gt;I know of a work around that I am being presented to on Thursday this week.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Oct 2023 08:54:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/CP-CME-Using-CME-to-deploy-a-shared-Threat-Prevention-Profile/m-p/194113#M4324</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2023-10-03T08:54:50Z</dc:date>
    </item>
  </channel>
</rss>

