<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ioc_feeds whitelist in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145218#M24959</link>
    <description>&lt;P&gt;Any developments with this? I am facing the same issue and have not been able to figure out how to whitelist individual url/ip?&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 08:28:37 GMT</pubDate>
    <dc:creator>huseyinyildirim</dc:creator>
    <dc:date>2022-04-01T08:28:37Z</dc:date>
    <item>
      <title>ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/133239#M24956</link>
      <description>&lt;P&gt;re: R80.40&lt;/P&gt;&lt;P&gt;We are ingesting ioc feeds via ioc_feeds command. We would like to have a process in place for whitelisting individual ip/url/domain in case the need arises. The logs show the feeds are being processed via anti-bot and anti-virus blades. What would be the most efficient method to accomplish this?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Nov 2021 13:58:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/133239#M24956</guid>
      <dc:creator>skidsteerpilot</dc:creator>
      <dc:date>2021-11-04T13:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/133280#M24957</link>
      <description>&lt;P&gt;IOC Feeds are done by AB/AV blades.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8166"&gt;@TP_Master&lt;/a&gt;&amp;nbsp;is there a way to explicitly allow something that would be blocked by an ioc_feed?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Nov 2021 04:19:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/133280#M24957</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-05T04:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/135475#M24958</link>
      <description>&lt;P&gt;We are still looking for a solution to whitelisting individual domain/url/ip that are ingested via ioc_feeds. TAC has not been able to provide a solution.&lt;/P&gt;&lt;P&gt;We are currently manually removing domain/url/ip that we need access to (false positives) and repushing ioc_feeds. This has to be done on a separate feed server and then the push on the gateway. This process is not sustainable.&lt;/P&gt;&lt;P&gt;We have tried:&lt;BR /&gt;1. using the "Add Exception" link on the Prevent log associated with the lookup&lt;BR /&gt;2. create manual "Global" exception using "Domain" as "Destination"&lt;BR /&gt;3. create manual "Global" exception using "Custom Application Site" and domain regex as seen in SK165094&lt;BR /&gt;4. 3&amp;amp;4 in "Recommended Protections Exceptions"&lt;BR /&gt;&lt;BR /&gt;Maybe this can not be done, but I would think anyone using ioc_feeds would have a viable solution to whitelist individual entries as users discover false positives.&amp;nbsp;&lt;/P&gt;&lt;P&gt;A caveat we have discovered is after an exception is put in place, there seems to be a short window of opportunity where it appears the exception is working, possible during reload, but then it fails. The 'window' seems to range in time, nothing specific. So, when working with TAC or on our own, there have been several occasions of high-fives, only later to discover the site in question is still blocked.&lt;/P&gt;&lt;P&gt;If anyone is working with ioc_feeds and has a whitelisting process that works, we would be interested to hear how that happens.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 15:52:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/135475#M24958</guid>
      <dc:creator>skidsteerpilot</dc:creator>
      <dc:date>2021-12-03T15:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145218#M24959</link>
      <description>&lt;P&gt;Any developments with this? I am facing the same issue and have not been able to figure out how to whitelist individual url/ip?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 08:28:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145218#M24959</guid>
      <dc:creator>huseyinyildirim</dc:creator>
      <dc:date>2022-04-01T08:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145240#M24960</link>
      <description>&lt;P&gt;Unfortunately not. I've ended up creating a separate text file of ip/urls to whitelist and then added a function in the script that creates the feed lists to remove any items found in that whitelist file. Thankfully, there have only been a handful that we have had to apply this to. Not elegant, but functional (so far).&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:05:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145240#M24960</guid>
      <dc:creator>skidsteerpilot</dc:creator>
      <dc:date>2022-04-01T13:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145245#M24961</link>
      <description>&lt;P&gt;There is a feature in R81.20 that might work better here for this use case: Network Feed object.&lt;BR /&gt;This should support both IPs and URLs and can be used in the Access Policy, making it significantly more flexible.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:37:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145245#M24961</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-04-01T13:37:29Z</dc:date>
    </item>
    <item>
      <title>Re: ioc_feeds whitelist</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145251#M24962</link>
      <description>&lt;P&gt;That sounds good. We're on R80.40. Upgrade planning is in progress so will look forward to this! Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 13:41:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ioc-feeds-whitelist/m-p/145251#M24962</guid>
      <dc:creator>skidsteerpilot</dc:creator>
      <dc:date>2022-04-01T13:41:59Z</dc:date>
    </item>
  </channel>
</rss>

