<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Embedded Office.com links in .PDF's in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6993#M14072</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can control this feature via:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;[Expert@Gateway:0]# tecli advanced analyzer&lt;BR /&gt;Command: root-&amp;gt;advanced-&amp;gt;analyzer&lt;BR /&gt;&lt;BR /&gt;Available options:&lt;BR /&gt; show - display analyzer attributes values&lt;BR /&gt; enable - enable or disable analyzer investigator&lt;BR /&gt; max_embedded_files_limit - Set maximum embedded files limit&lt;BR /&gt; max_embedded_links_limit - Set maximum embedded links limit&lt;BR /&gt; prohibited - prohibited objects menu&lt;BR /&gt;&lt;BR /&gt;[Expert@Gateway:0]# tecli advanced analyzer show&lt;BR /&gt; File Analyzer: ON&lt;BR /&gt; Maximum embedded files limit: 10&lt;BR /&gt; Maximum embedded links limit: 20&lt;BR /&gt; Block encrypted documents: OFF&lt;BR /&gt; Block documents that contain sensitive links (links to local or network path): OFF&lt;BR /&gt; Block documents that contain macros and code: OFF&lt;BR /&gt; Block documents with embedded word file type: OFF&lt;BR /&gt; Block documents with embedded excel file type: OFF&lt;BR /&gt; Block documents with embedded power point file type: OFF&lt;BR /&gt; Block documents with embedded executable file type: OFF&lt;BR /&gt; Block documents with embedded zip file type: OFF&lt;BR /&gt; Block documents with embedded flash file type: OFF&lt;BR /&gt; Block documents with embedded pdf file type: OFF&lt;BR /&gt; Block documents with embedded js file type: OFF&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reporting possible FPs to Check Point is valuable because it remediates also possible future FPs.&lt;/P&gt;&lt;P&gt;In many cases we can change "Detection rules" which is not simple file hash whitelisting. In such cases multiple FPs will be gone in a single effort if the behavioral detection behind the FP is the same. Detection rules are updated automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Always remember that during opening a FP case we will check if the file is really malicious. There were cases in the past that first looked like a FP but during analysts investigation were proofed to be malicious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Oct 2017 12:33:42 GMT</pubDate>
    <dc:creator>Thomas_Werner</dc:creator>
    <dc:date>2017-10-04T12:33:42Z</dc:date>
    <item>
      <title>Embedded Office.com links in .PDF's</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6992#M14071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Hi all, I noticed that the Sandblast marks particulair.pdf files with an embedded link from Microsoft (in this case a custom created Office form via &lt;A href="https://forms.office.com"&gt;https://forms.office.com&lt;/A&gt;) as a malicious C&amp;amp;C site. &amp;nbsp;This is defiantly a false positive. Anyone experienced the same?. Of course I can follow sk118875 and submit this false positive for review by Check Point support but this is quite a hassle due to privacy rights and sharing customer data etc. Any suggestions are welcome. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Oct 2017 13:29:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6992#M14071</guid>
      <dc:creator>Andre_K</dc:creator>
      <dc:date>2017-10-03T13:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Embedded Office.com links in .PDF's</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6993#M14072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can control this feature via:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;[Expert@Gateway:0]# tecli advanced analyzer&lt;BR /&gt;Command: root-&amp;gt;advanced-&amp;gt;analyzer&lt;BR /&gt;&lt;BR /&gt;Available options:&lt;BR /&gt; show - display analyzer attributes values&lt;BR /&gt; enable - enable or disable analyzer investigator&lt;BR /&gt; max_embedded_files_limit - Set maximum embedded files limit&lt;BR /&gt; max_embedded_links_limit - Set maximum embedded links limit&lt;BR /&gt; prohibited - prohibited objects menu&lt;BR /&gt;&lt;BR /&gt;[Expert@Gateway:0]# tecli advanced analyzer show&lt;BR /&gt; File Analyzer: ON&lt;BR /&gt; Maximum embedded files limit: 10&lt;BR /&gt; Maximum embedded links limit: 20&lt;BR /&gt; Block encrypted documents: OFF&lt;BR /&gt; Block documents that contain sensitive links (links to local or network path): OFF&lt;BR /&gt; Block documents that contain macros and code: OFF&lt;BR /&gt; Block documents with embedded word file type: OFF&lt;BR /&gt; Block documents with embedded excel file type: OFF&lt;BR /&gt; Block documents with embedded power point file type: OFF&lt;BR /&gt; Block documents with embedded executable file type: OFF&lt;BR /&gt; Block documents with embedded zip file type: OFF&lt;BR /&gt; Block documents with embedded flash file type: OFF&lt;BR /&gt; Block documents with embedded pdf file type: OFF&lt;BR /&gt; Block documents with embedded js file type: OFF&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reporting possible FPs to Check Point is valuable because it remediates also possible future FPs.&lt;/P&gt;&lt;P&gt;In many cases we can change "Detection rules" which is not simple file hash whitelisting. In such cases multiple FPs will be gone in a single effort if the behavioral detection behind the FP is the same. Detection rules are updated automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Always remember that during opening a FP case we will check if the file is really malicious. There were cases in the past that first looked like a FP but during analysts investigation were proofed to be malicious.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 12:33:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6993#M14072</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2017-10-04T12:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Embedded Office.com links in .PDF's</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6994#M14073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Hi Thomas, thank you for your reply. I am familiar with the analyzer but in this case it seems like the TE marks this particular link as malicious, it’s not an embedded file within the PDF. &amp;nbsp;I will might indeed consider submitting this possible FP to support for review. Thanks again! &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 12:43:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Embedded-Office-com-links-in-PDF-s/m-p/6994#M14073</guid>
      <dc:creator>Andre_K</dc:creator>
      <dc:date>2017-10-04T12:43:08Z</dc:date>
    </item>
  </channel>
</rss>

