<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How many clicks does it take to add exception rule from a log? (Access Control  in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-many-clicks-does-it-take-to-add-exception-rule-from-a-log/m-p/2438#M102550</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Threat Prevention - &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;1 click!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simply right-click the log and select "Add Exception". Details of the exception to the threat prevention policy are filled automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53221" alt="threat1.png" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53221_threat1.png" style="width: 620px; height: 237px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53222" alt="threat2.png" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53222_threat2.png" style="width: 620px; height: 238px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Control -&amp;nbsp; &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;about 5 clicks!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because the access control policy is all about order of rules and first-match, the administrator has to choose the desired location of his rules. &lt;/P&gt;&lt;P&gt;After clicking a rule and seeing its logs, right-clicking a log's source or destination IP address opens a context menu with an option to create a host from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53223" alt="access1.png" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53223_access1.png" style="width: 620px; height: 337px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53224" alt="access2.png" class="image-4 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53224_access2.png" style="width: 620px; height: 335px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During the creation of a new rule, when picking source/destination, the recently created objects always show up on the top of the picker and save time from searching for them in the list of network objects. &lt;/P&gt;&lt;P&gt;This is one of the ways in which R80 SmartConsole tries to "understand" the mind of the user and suggest the most suitable common actions and values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53225" alt="access4.png" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53225_access4.png" style="width: 620px; height: 278px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Jun 2016 12:28:38 GMT</pubDate>
    <dc:creator>Tomer_Sole</dc:creator>
    <dc:date>2016-06-09T12:28:38Z</dc:date>
    <item>
      <title>How many clicks does it take to add exception rule from a log? (Access Control &amp; Threat Prevention)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-many-clicks-does-it-take-to-add-exception-rule-from-a-log/m-p/2437#M102549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R80 includes integrated logs in the policy views. Often, changes happen from inspecting traffic logs. Can we demonstrate how it speeds up policy change management?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jun 2016 12:22:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-many-clicks-does-it-take-to-add-exception-rule-from-a-log/m-p/2437#M102549</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2016-06-09T12:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: How many clicks does it take to add exception rule from a log? (Access Control</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-many-clicks-does-it-take-to-add-exception-rule-from-a-log/m-p/2438#M102550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Threat Prevention - &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;1 click!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simply right-click the log and select "Add Exception". Details of the exception to the threat prevention policy are filled automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53221" alt="threat1.png" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53221_threat1.png" style="width: 620px; height: 237px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53222" alt="threat2.png" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53222_threat2.png" style="width: 620px; height: 238px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Control -&amp;nbsp; &lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;about 5 clicks!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because the access control policy is all about order of rules and first-match, the administrator has to choose the desired location of his rules. &lt;/P&gt;&lt;P&gt;After clicking a rule and seeing its logs, right-clicking a log's source or destination IP address opens a context menu with an option to create a host from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53223" alt="access1.png" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53223_access1.png" style="width: 620px; height: 337px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53224" alt="access2.png" class="image-4 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53224_access2.png" style="width: 620px; height: 335px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During the creation of a new rule, when picking source/destination, the recently created objects always show up on the top of the picker and save time from searching for them in the list of network objects. &lt;/P&gt;&lt;P&gt;This is one of the ways in which R80 SmartConsole tries to "understand" the mind of the user and suggest the most suitable common actions and values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="53225" alt="access4.png" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/53225_access4.png" style="width: 620px; height: 278px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Jun 2016 12:28:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-many-clicks-does-it-take-to-add-exception-rule-from-a-log/m-p/2438#M102550</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2016-06-09T12:28:38Z</dc:date>
    </item>
  </channel>
</rss>

