<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Content awareness in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84784#M11265</link>
    <description>The exe block rule is first.</description>
    <pubDate>Mon, 11 May 2020 04:24:40 GMT</pubDate>
    <dc:creator>Andreas_Ahrnby</dc:creator>
    <dc:date>2020-05-11T04:24:40Z</dc:date>
    <item>
      <title>Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84381#M11262</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a rule that allow MS Office files to be uploaded to a FTP server and I block execute files.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;But if I import an execute file inside an excel file the blade let the file pass.&amp;nbsp;&lt;BR /&gt;Cant the blade be this “smart” to see the inserted .exe or i am doing something wrong here?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 20:08:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84381#M11262</guid>
      <dc:creator>Andreas_Ahrnby</dc:creator>
      <dc:date>2020-05-06T20:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84395#M11263</link>
      <description>&lt;P&gt;Most File Type Recognition libraries rarely iterate over entire file content for performance reasons. In most cases they only look for predefined patterns to "guess"file type.&lt;/P&gt;
&lt;P&gt;Notice that you are uploading Excel file with binary content inside it but it is after all Excel file which is allowed by the policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 03:40:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84395#M11263</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-05-07T03:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84777#M11264</link>
      <description>What rule comes first, the one that blocks EXE files or the one that allows Excel?&lt;BR /&gt;Order matters.</description>
      <pubDate>Mon, 11 May 2020 00:19:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84777#M11264</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-11T00:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84784#M11265</link>
      <description>The exe block rule is first.</description>
      <pubDate>Mon, 11 May 2020 04:24:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/84784#M11265</guid>
      <dc:creator>Andreas_Ahrnby</dc:creator>
      <dc:date>2020-05-11T04:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85092#M11266</link>
      <description>Might be worth a TAC case to confirm this is correct behavior.</description>
      <pubDate>Wed, 13 May 2020 16:24:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85092#M11266</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-13T16:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85103#M11267</link>
      <description>&lt;P&gt;Actually I find out that the content sees the embedded file but not as its file name but as a inobject.bin. Don’t remember the exact name now so what I did was to make a own template and block everything with .bin&lt;/P&gt;&lt;P&gt;this behavior seems only to be with MS office files, if I take an .pdf with an embedded .exe file it gets blocked and the blade can see the exact filename inside the .pdf&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 18:14:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85103#M11267</guid>
      <dc:creator>Andreas_Ahrnby</dc:creator>
      <dc:date>2020-05-13T18:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: Content awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85114#M11268</link>
      <description>At least you have a workaround, which is good.</description>
      <pubDate>Wed, 13 May 2020 22:11:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Content-awareness/m-p/85114#M11268</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-05-13T22:11:33Z</dc:date>
    </item>
  </channel>
</rss>

