<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Efficient way to disable several hundred IPS protections that do apply to our environment in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103281#M10097</link>
    <description>&lt;P&gt;You answered my intended question by elaborating it in your explanation.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;-Faisal&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2020 16:43:15 GMT</pubDate>
    <dc:creator>FM</dc:creator>
    <dc:date>2020-11-25T16:43:15Z</dc:date>
    <item>
      <title>Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103163#M10087</link>
      <description>&lt;P&gt;&lt;SPAN&gt;1. What is the the most efficient way to disable several hundred IPS protections that do apply to our environment? We are trying to avoid the use of manual method such as shown in the attached screenshot. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. Can you also share a strategy how to apply different list of IPS rules for the External and Internal Policy. For example, IPS protections that the attack requires that the vulnerable system be exposed to the internet should not be applied to the internal firewall policy.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 17:15:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103163#M10087</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-24T17:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103177#M10088</link>
      <description>&lt;P&gt;You can create a profile for the specific area you are protecting, and inside the properties of that profile you can deactivate protections for specific vendors, products, etc...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 18:52:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103177#M10088</guid>
      <dc:creator>AlejandroH</dc:creator>
      <dc:date>2020-11-24T18:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103185#M10089</link>
      <description>&lt;P&gt;Thank you for sharing the info!&lt;/P&gt;&lt;P&gt;Is their a way to identify IPS protections based on their applicability to the internal network that is behind the internal firewall? For example based a category of attack types; SQL injection, XSS, etc?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 19:37:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103185#M10089</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-24T19:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103189#M10090</link>
      <description>&lt;P&gt;Normally the best way to address the needs for protections in the different parts of the network is entirely around a few things:&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; Asset management:&amp;nbsp; Knowing what assets are in different parts of the environments based of change control requirements in your organization.&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; Vulnerability assessments:&amp;nbsp; If you are running a vulnerability scanning tool (Rapid7, Nessus, OpenVAS) you can look at the assets in the network and build your IPS profile with what is in that part of the environment.&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp; Tailored Safe:&amp;nbsp; If you are running R80.30+, you can enable SmartExtension called Tailored Sage and it will&amp;nbsp; build a profile around the hits in your logs.&amp;nbsp; You can just validate the IPs with what services are out there.&amp;nbsp;&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/SmartEvent/IPS-Utilization/m-p/100329" target="_blank"&gt;https://community.checkpoint.com/t5/SmartEvent/IPS-Utilization/m-p/100329&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 20:09:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103189#M10090</guid>
      <dc:creator>AlejandroH</dc:creator>
      <dc:date>2020-11-24T20:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103196#M10091</link>
      <description>&lt;P&gt;1. We do run vuln scan with Rapid7. What kind of report can run to identify&amp;nbsp;&lt;SPAN&gt;the assets in the environment?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. Can I use SCCM&lt;/SPAN&gt;&lt;SPAN&gt;?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. I will read the documentation&amp;nbsp;on "Tailored Sage". Our management gateways are R80.40 but the blades are at R80.20.&lt;BR /&gt;&lt;BR /&gt;Finally, how can disable, the several hundred non-applicable&lt;/SPAN&gt;&lt;SPAN&gt; IPS protections which are in the current profile, other than by selecting each protection one by one manually? --For example using a csv file&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 21:14:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103196#M10091</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-24T21:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103203#M10092</link>
      <description>&lt;P&gt;The most efficient way to disable a bunch of protections is via the API.&lt;BR /&gt;On the other hand, why do you feel this is necessary?&lt;/P&gt;
&lt;P&gt;If your logic is: better performance with less signatures, you won’t achieve better performance by doing this since most of the performance impact comes from turning on IPS to begin with, not necessarily the specific signatures used (though high/critical performance impact ones will).&lt;BR /&gt;If your logic is: reducing false positives, false positives may still be a thing even if you disable all those “irrelevant” signatures.&lt;BR /&gt;False positives can be dealt with as needed with exceptions in any case.&lt;/P&gt;
&lt;P&gt;I don’t see what’s gained by going through the exercise.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 23:05:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103203#M10092</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-24T23:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103204#M10093</link>
      <description>&lt;P&gt;There are a lot of bulk operations that can be easily performed on collections of IPS signatures that are not immediately obvious, the following is excerpted from my "IPS Immersion" self-guided video series.&lt;/P&gt;
&lt;P&gt;There are many hidden columns on the IPS Protections screen that can be revealed and then used to sort protections, I find the "Vendor" and "Product" ones very useful:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Hidden_Columns.png" style="width: 925px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9249iE6CE1AC22BBA490A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Hidden_Columns.png" alt="Hidden_Columns.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Filters tab on the right is useful and well, and can have extra filtering criteria unhidden by clicking the "+" character, note the hidden vendor and product lists as well:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Filter_tab.png" style="width: 619px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9250iB41A10C2B6BD8A8C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Filter_tab.png" alt="Filter_tab.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Filter_Plus.png" style="width: 384px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9252i7A09FCCF84512321/image-size/large?v=v2&amp;amp;px=999" role="button" title="Filter_Plus.png" alt="Filter_Plus.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you get the desired list of protections displayed by using the various "Filter" tab checkboxes and even the search field above, and you want to perform a bulk operation upon all of those currently displayed, you can set all of them to Protect, Detect, or Inactive from the Actions menu with one click as shown below; these operations can be run on hundreds or even thousands of IPS Protections.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bulk_ops.png" style="width: 819px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9253i34F450456D9AB7A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="bulk_ops.png" alt="bulk_ops.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 23:06:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103204#M10093</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-11-24T23:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103270#M10094</link>
      <description>&lt;P&gt;Both reasons:&lt;BR /&gt;1. Reduce&amp;nbsp;&lt;SPAN&gt;the specific signatures with performance impact. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. And also reduce FPs for products or versions we do not have.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 15:16:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103270#M10094</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-25T15:16:42Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103272#M10095</link>
      <description>&lt;P&gt;Your post contains valuable information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is their any other strategy to define IPS protections based on whether the attack surface needs to be exposed to the internet for the attack to succeed or is unreachable because it is behind the internal IPS blade and the firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 15:44:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103272#M10095</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-25T15:44:12Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103273#M10096</link>
      <description>&lt;P&gt;Not entirely sure what you are asking, but each IPS Protection is defined as either a "client" or "server" attack; you can expose this hidden header and then sort Protections by client/server to bunch them up for a bulk operation.&amp;nbsp; The client/server designation is unfortunately not available on the Filters tab though.&lt;/P&gt;
&lt;P&gt;Server attacks would normally be initiated inbound from the Internet against your server which has some exposure to the Internet, although obviously a server-based attack could be launched from the inside as well.&amp;nbsp; Client attacks usually occur when an internal system visits or is tricked into visiting a malicious website, which then tries to exploit a vulnerability in the client's browser, and shove some kind of malicious code onto the client's machine for execution.&amp;nbsp; So Server attacks would definitely qualify as "exposure" to the Internet, but really so would Client based ones, the connection just happens to be initiated by your internal client.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I guess it depends on what you mean by "exposure".&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 18:40:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103273#M10096</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-11-25T18:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Efficient way to disable several hundred IPS protections that do apply to our environment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103281#M10097</link>
      <description>&lt;P&gt;You answered my intended question by elaborating it in your explanation.&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;-Faisal&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 16:43:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Efficient-way-to-disable-several-hundred-IPS-protections-that-do/m-p/103281#M10097</guid>
      <dc:creator>FM</dc:creator>
      <dc:date>2020-11-25T16:43:15Z</dc:date>
    </item>
  </channel>
</rss>

