<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Application by wireshark raws data pattern? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68527#M12115</link>
    <description>&lt;P&gt;That imho is a misunderstanding - APCL and URLF deal with URLs and Applications that communicate using the internet. What you want to achieve is to prevent downloading malware, a job done by AV and TE / TX.&amp;nbsp;Custom Applications get defined to enable, disable or limit their internet traffic in APCL rulebase.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2019 15:06:40 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2019-11-26T15:06:40Z</dc:date>
    <item>
      <title>Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68330#M12110</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;I try to create a custom signature with Wireshark raw data pattern, but it's not working.&lt;/P&gt;&lt;P&gt;Scenario:-I have an FTP server and I&amp;nbsp; download two files from the FTP server and capture this in Wireshark and create a signature with one file raw data. I want when next time when I download the same file from the FTP server it should be blocked by my custom signature.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2019 07:25:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68330#M12110</guid>
      <dc:creator>Happy__</dc:creator>
      <dc:date>2019-11-25T07:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68466#M12111</link>
      <description>Maybe just create a file hash IOC using the AV blade instead?</description>
      <pubDate>Tue, 26 Nov 2019 04:13:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68466#M12111</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-11-26T04:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68485#M12112</link>
      <description>&lt;P&gt;Yup, I know we can do with AV &amp;amp; IPS, but the requirement is to do with the application signature tool.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 07:49:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68485#M12112</guid>
      <dc:creator>Happy__</dc:creator>
      <dc:date>2019-11-26T07:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68488#M12113</link>
      <description>&lt;P&gt;Wrong tool:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Signature Tool for Application and URL Filtering Administration Guide&lt;/SPAN&gt;&lt;SPAN&gt; | 5 &lt;/SPAN&gt;&lt;SPAN&gt;Introduction&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check Point Signature Tool lets you create Application and URL Filtering for your own or third-party &lt;/SPAN&gt;&lt;SPAN&gt;applications. This tool expands your local Application and URL Filtering Database for applications and URLs &lt;/SPAN&gt;&lt;SPAN&gt;that you add. Application and URL Filtering detects and enforces your policies on added signatures as with &lt;/SPAN&gt;&lt;SPAN&gt;Check Point defined signatures. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For preventing downloads we use AV.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 08:18:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68488#M12113</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-11-26T08:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68490#M12114</link>
      <description>&lt;P&gt;In the application signature tool, there is an option that we can create a signature with raw data. So I was just trying to block a specific file with the file raw data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 08:26:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68490#M12114</guid>
      <dc:creator>Happy__</dc:creator>
      <dc:date>2019-11-26T08:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Application by wireshark raws data pattern?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68527#M12115</link>
      <description>&lt;P&gt;That imho is a misunderstanding - APCL and URLF deal with URLs and Applications that communicate using the internet. What you want to achieve is to prevent downloading malware, a job done by AV and TE / TX.&amp;nbsp;Custom Applications get defined to enable, disable or limit their internet traffic in APCL rulebase.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2019 15:06:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Custom-Application-by-wireshark-raws-data-pattern/m-p/68527#M12115</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-11-26T15:06:40Z</dc:date>
    </item>
  </channel>
</rss>

