<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MTA AV Exceptions in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/62034#M13480</link>
    <description>Hi Miguel,&lt;BR /&gt;&lt;BR /&gt;the easiest way is to use IOC Indicators exceptions (mark them as inactive)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot,#Indicator%20(IOC" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot,#Indicator%20(IOC&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;documentation is not the greatest but you need to build a csv file in the following format&lt;BR /&gt;&lt;BR /&gt;# UNIQ-NAME,VALUE,TYPE,CONFIDENCE,SEVERITY,PRODUCT,COMMENT&lt;BR /&gt;Indicator_bypsass &lt;A href="https://abcd.com" target="_blank"&gt;https://abcd.com&lt;/A&gt; URL low low AV bypass1&lt;BR /&gt;</description>
    <pubDate>Fri, 06 Sep 2019 08:31:49 GMT</pubDate>
    <dc:creator>Shahar_Grober</dc:creator>
    <dc:date>2019-09-06T08:31:49Z</dc:date>
    <item>
      <title>MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48462#M13474</link>
      <description>Hi, AV in MTA is blocking one of our emails coming from a trusted source This is a False positive. The only option I see to exclude the sender Mail Adress is in IPS profile --&amp;gt; Threat Emulation --&amp;gt; Excluded Mail Adresses. Is there a way to exlude Emails from MTA scanning until the issue is resolved with the AV?</description>
      <pubDate>Mon, 25 Mar 2019 10:02:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48462#M13474</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2019-03-25T10:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48491#M13475</link>
      <description>Seems to me you could create a modified Threat Prevention policy to do this, where traffic coming from your partners SMTP server doesn't have AV applied…</description>
      <pubDate>Mon, 25 Mar 2019 13:48:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48491#M13475</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-25T13:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48619#M13476</link>
      <description>The problem is that the traffic is incoming from the mail relay The AV MTA doesn't have a way to exclude email addresses (in opposite to TE MTA) According to TAC I have to use indicators to exclude it from Threat Prevention policy but this makes everything more complicated since I cannot only exclude the trusted sender email address</description>
      <pubDate>Tue, 26 Mar 2019 10:00:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48619#M13476</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2019-03-26T10:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48760#M13477</link>
      <description>That's why I suggested using the IP address of the SMTP server (assuming they're coming from the same IP).</description>
      <pubDate>Tue, 26 Mar 2019 21:45:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48760#M13477</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-26T21:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48882#M13478</link>
      <description>This is not possible because the IP address is of the mail relay External SMTP Mail server --&amp;gt; Mail Realy --&amp;gt; Check Point MTA --&amp;gt; Exchange The MTA sees only the mail relay so I cannot exclude the mail of the external SMTP server because the source is the mail relay</description>
      <pubDate>Wed, 27 Mar 2019 17:44:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/48882#M13478</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2019-03-27T17:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/61983#M13479</link>
      <description>Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27485"&gt;@Shahar_Grober&lt;/a&gt;, Im experiencing the same situation with a client (AV MTA with false positive).&lt;BR /&gt;were you able to solve this??? I would greatly appreciate your comments</description>
      <pubDate>Thu, 05 Sep 2019 20:16:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/61983#M13479</guid>
      <dc:creator>MikeB</dc:creator>
      <dc:date>2019-09-05T20:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/62034#M13480</link>
      <description>Hi Miguel,&lt;BR /&gt;&lt;BR /&gt;the easiest way is to use IOC Indicators exceptions (mark them as inactive)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot,#Indicator%20(IOC" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92264&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot,#Indicator%20(IOC&lt;/A&gt;)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;documentation is not the greatest but you need to build a csv file in the following format&lt;BR /&gt;&lt;BR /&gt;# UNIQ-NAME,VALUE,TYPE,CONFIDENCE,SEVERITY,PRODUCT,COMMENT&lt;BR /&gt;Indicator_bypsass &lt;A href="https://abcd.com" target="_blank"&gt;https://abcd.com&lt;/A&gt; URL low low AV bypass1&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Sep 2019 08:31:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/62034#M13480</guid>
      <dc:creator>Shahar_Grober</dc:creator>
      <dc:date>2019-09-06T08:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207497#M39249</link>
      <description>&lt;P&gt;Hello, we have the same issue.&lt;/P&gt;&lt;P&gt;We implemented the threat prevention exclusion for the URLs via Smart Console (global exeptions).&lt;/P&gt;&lt;P&gt;We will test the configuration in the next days, we will update the community.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 17:24:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207497#M39249</guid>
      <dc:creator>Cristian_F_CCSM</dc:creator>
      <dc:date>2024-02-29T17:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207526#M39258</link>
      <description>&lt;P&gt;Hello, this configuration doesn't work.&lt;/P&gt;&lt;P&gt;We will proceed with IOC Indicators exceptions... stay tuned!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 07:24:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207526#M39258</guid>
      <dc:creator>Cristian_F_CCSM</dc:creator>
      <dc:date>2024-03-01T07:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207705#M39329</link>
      <description>&lt;P&gt;Hello, not even the use of IOC Indicators (inactive) solved the problem.&lt;BR /&gt;We will open an SR to the TAC.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 09:47:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207705#M39329</guid>
      <dc:creator>Cristian_F_CCSM</dc:creator>
      <dc:date>2024-03-04T09:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: MTA AV Exceptions</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207842#M39361</link>
      <description>&lt;P&gt;Hello, we used &lt;SPAN class=""&gt;sk166272&lt;/SPAN&gt; with success.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 14:34:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-AV-Exceptions/m-p/207842#M39361</guid>
      <dc:creator>Cristian_F_CCSM</dc:creator>
      <dc:date>2024-03-05T14:34:29Z</dc:date>
    </item>
  </channel>
</rss>

