<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Capsule Cloud Threat Emulation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52151#M13348</link>
    <description>Tell me about this one: EP Antibot downloads a .tar file from secureupdates.checkpoint.com that results in 'detect', reason: file size exceeded size limit, if this is whitelisted then why is the file size limit reached.</description>
    <pubDate>Mon, 29 Apr 2019 15:21:19 GMT</pubDate>
    <dc:creator>Dan_Roddy</dc:creator>
    <dc:date>2019-04-29T15:21:19Z</dc:date>
    <item>
      <title>Capsule Cloud Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52002#M13344</link>
      <description>&lt;P&gt;The following domains deliver files to our client Windows 10 workstations and mobile Surface books that are continuously Emulated despite my efforts to bypass emulation.&amp;nbsp; I do not consider files that deliver windows updates, checkpoint updates, symantec updates and others to be risky and emulating them is using unnecessary resources of time and licensing.&amp;nbsp; Has anyone tried to bypass cloud emulation for these domains?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 21:54:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52002#M13344</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2019-04-26T21:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: Capsule Cloud Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52021#M13345</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Does the source in the emulation log say "Trusted Source" ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Some of those "domains" or "services" you mention shouldn't actually result in the file being sent out to the cloud for emulation thanks to a global white list.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2019 09:33:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52021#M13345</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2019-04-27T09:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Capsule Cloud Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52147#M13346</link>
      <description>Thanks for the reply Chris, Yes for liveupdate.symantecliveupdate.com does show trusted source and benign verdict. But in this case, the file being emulated is a 7z filetype and all indications are the file is emulated. Also, I have Office templates in .cab files and also windowsupdate .cab (trused source:yes) and all these show 'analyzed_on' Check Point Threat Cloud. Where is the whitelist?</description>
      <pubDate>Mon, 29 Apr 2019 14:51:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52147#M13346</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2019-04-29T14:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Capsule Cloud Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52148#M13347</link>
      <description>Another candidate for whitelisting is 'content.ivanti.com'. Ivanti has a patching application and they deliver windows patch files in .zip files. These file are extracted and deliver a benign verdict for every file in the zip. Multiply all these patch file by the number of workstations and you can see why our emulation file count per month is quite high. Can this work as advertised? Won't all these patch files from Microsoft have the same hash value?</description>
      <pubDate>Mon, 29 Apr 2019 14:59:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52148#M13347</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2019-04-29T14:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Capsule Cloud Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52151#M13348</link>
      <description>Tell me about this one: EP Antibot downloads a .tar file from secureupdates.checkpoint.com that results in 'detect', reason: file size exceeded size limit, if this is whitelisted then why is the file size limit reached.</description>
      <pubDate>Mon, 29 Apr 2019 15:21:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Capsule-Cloud-Threat-Emulation/m-p/52151#M13348</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2019-04-29T15:21:19Z</dc:date>
    </item>
  </channel>
</rss>

