<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detect in Log and Prevent in Report. How can it be? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15778#M13553</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did the end user in question actually receive the document?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Nov 2018 19:40:32 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-11-16T19:40:32Z</dc:date>
    <item>
      <title>Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15773#M13548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello. I need some help with Threat Emulation. Our customer have a couple of incidents with virus prevention.&lt;/P&gt;&lt;P&gt;A virus file can pass check point with detect in logs:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74563_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;Matched Rules:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74564_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;Rules:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74565_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;Severity - Critical, Confidence Level - High. Threat Prevention profile:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="74159" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74159_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74566_pastedImage_4.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74567_pastedImage_5.png" /&gt;&lt;/P&gt;&lt;P&gt;At the same time if we open summury report we see Prevent:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74568_pastedImage_6.png" /&gt;&lt;/P&gt;&lt;P&gt;What is wrong? Antivirus does not blok this file too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 07:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15773#M13548</guid>
      <dc:creator>Evgeniy_Olkov</dc:creator>
      <dc:date>2018-11-13T07:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15774#M13549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just with a quick glance - Threat prevention profile shows "Standard" and next screenshot profile name is different&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 07:55:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15774#M13549</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-13T07:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15775#M13550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for that, it's just an example. I have not an original screenshots (just for now).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 07:58:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15775#M13550</guid>
      <dc:creator>Evgeniy_Olkov</dc:creator>
      <dc:date>2018-11-13T07:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15776#M13551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's all in the details. Actual screenshots showing your real sypmtoms will allow us to help you. Please replace the examples above with your real screenshots.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 10:15:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15776#M13551</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-11-13T10:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15777#M13552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have updated screenshots&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Nov 2018 07:49:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15777#M13552</guid>
      <dc:creator>Evgeniy_Olkov</dc:creator>
      <dc:date>2018-11-15T07:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15778#M13553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did the end user in question actually receive the document?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:40:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15778#M13553</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T19:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15779#M13554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. Local antivirus detect it in received email.&lt;/P&gt;&lt;P&gt;Actually I have noticed that our other customer has the same problem.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Nov 2018 08:32:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15779#M13554</guid>
      <dc:creator>Evgeniy_Olkov</dc:creator>
      <dc:date>2018-11-17T08:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15780#M13555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I could see the Forensics piece saying prevent if AV ultimately caught it (even if TE didn’t).&lt;/P&gt;&lt;P&gt;A TAC case is probably warranted here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Nov 2018 16:02:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15780#M13555</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-17T16:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Detect in Log and Prevent in Report. How can it be?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15781#M13556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have created TAC case. They are going to organize remote session. I'll share the answer after.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Nov 2018 06:34:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Detect-in-Log-and-Prevent-in-Report-How-can-it-be/m-p/15781#M13556</guid>
      <dc:creator>Evgeniy_Olkov</dc:creator>
      <dc:date>2018-11-19T06:34:01Z</dc:date>
    </item>
  </channel>
</rss>

