<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPS/AV signature release notes or full list in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178105#M32644</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Are there any release notes for Threat updates for Quantum?&lt;BR /&gt;I need to have accounting visibility into signatures by severity, introduction date and type (AV/IPS) + overall signature count change between update releases as part of the project.&lt;BR /&gt;So far I could see there's some filtering on&amp;nbsp;&lt;A href="https://threatwiki.checkpoint.com/threatwiki/public.htm" target="_blank"&gt;https://threatwiki.checkpoint.com/threatwiki/public.htm &lt;/A&gt;&lt;/P&gt;&lt;P&gt;but lacking in filtering options I need. Is there an option to escort the entire Threat DB into CVS somehow?&lt;/P&gt;</description>
    <pubDate>Fri, 14 Apr 2023 15:07:04 GMT</pubDate>
    <dc:creator>jdoe1979</dc:creator>
    <dc:date>2023-04-14T15:07:04Z</dc:date>
    <item>
      <title>IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178105#M32644</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Are there any release notes for Threat updates for Quantum?&lt;BR /&gt;I need to have accounting visibility into signatures by severity, introduction date and type (AV/IPS) + overall signature count change between update releases as part of the project.&lt;BR /&gt;So far I could see there's some filtering on&amp;nbsp;&lt;A href="https://threatwiki.checkpoint.com/threatwiki/public.htm" target="_blank"&gt;https://threatwiki.checkpoint.com/threatwiki/public.htm &lt;/A&gt;&lt;/P&gt;&lt;P&gt;but lacking in filtering options I need. Is there an option to escort the entire Threat DB into CVS somehow?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 15:07:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178105#M32644</guid>
      <dc:creator>jdoe1979</dc:creator>
      <dc:date>2023-04-14T15:07:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178108#M32645</link>
      <description>&lt;P&gt;We have a mailing list that provides updates when IPS protections are updated.&lt;BR /&gt;Subscribe here:&amp;nbsp;&lt;A href="https://advisories.checkpoint.com/security-advisories-subscription/" target="_blank"&gt;https://advisories.checkpoint.com/security-advisories-subscription/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can get the entire list of protections via the Management API.&amp;nbsp;&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-threat-protections~v1.9%20" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/APIs/index.html#cli/show-threat-protections~v1.9%20&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Note that due to the number of results returned (several thousand), this will require multiple API calls using the offset parameter to return the next 50 results.&lt;BR /&gt;Using mgmt_cli and jq, it should be possible to turn this into a CSV file.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 15:33:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178108#M32645</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-14T15:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178114#M32648</link>
      <description>&lt;P&gt;Understood.&lt;BR /&gt;Will CSV have all the selectors around type, date of incept, description?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 16:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178114#M32648</guid>
      <dc:creator>jdoe1979</dc:creator>
      <dc:date>2023-04-14T16:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178116#M32649</link>
      <description>&lt;P&gt;It's easy enough to check: mgmt_cli -r true show threat-protections details-level "full" --format json | jq '.'&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;  "protections": [
    {
      "uid": "9118d0c5-83d8-42eb-807c-5c2ab3304f3e",
      "name": "29o3 CMS Remote Code Execution (CVE-2010-1922)",
      "type": "threat-protection",
      "domain": {
        "uid": "41e821a0-3720-11e3-aa6e-0800200c9fde",
        "name": "SMC User",
        "domain-type": "domain"
      },
      "severity": "High",
      "confidence-level": "Medium",
      "performance-impact": "Medium",
      "release-date": "20201028",
      "update-date": "20201028",
      "comments": "",
      "protection-type": "Threat Cloud",
      "follow-up": false,
      "industry-reference": [
        "CVE-2010-1922"
      ]
    },
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 17:28:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178116#M32649</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-14T17:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178152#M32658</link>
      <description>&lt;P&gt;hm, I'm getting an error despite API status being fine (see below)&lt;/P&gt;&lt;P&gt;I was able to connect via Postman, but looks like this only covers IPS signatures and no visibility into AV.&lt;BR /&gt;I'd like it to filter on protection-type for AV, but not sure what the syntax is for AV.&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;MGR&amp;gt; mgmt_cli -r true show threat-protections details-level "full" --format json | jq '.' --port 4434&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;MGMT9205&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;You are not logged in to management server, in order to log-in you will need to run "mgmt login user [user name]"&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;STRONG&gt;&lt;SPAN class=""&gt;MGR&amp;gt; api status&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;API Settings:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;---------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Accessibility:&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Require all granted&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Automatic Start:&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Enabled&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Processes:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Name&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;State &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;PID &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;More Information&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;API &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Started &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;26850&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CPM &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Started &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;26850 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Check Point Security Management Server is running and ready&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;FWM &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Started &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;26335&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;APACHE&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Started &lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;9941 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Port Details:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;JETTY Internal Port: &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;54595&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;JETTY Documentation Internal Port: 58272&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;APACHE Gaia Port:&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;4434 (a non-default port)&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;When running mgmt_cli commands add '--port 4434'&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;When using web-services, add port 4434 to the URL&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Profile:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Machine profile: &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Large env resources profile with SME or Dedicated Log Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CPM heap size: &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;1280m&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Apache port retrieved from: httpd-ssl.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;--------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Overall API Status: Started&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;--------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;API readiness test SUCCESSFUL. The server is up and ready to receive connections&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Notes:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;To collect troubleshooting data, please run 'api status -s &amp;lt;comment&amp;gt;'&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Apr 2023 22:03:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178152#M32658</guid>
      <dc:creator>jdoe1979</dc:creator>
      <dc:date>2023-04-15T22:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPS/AV signature release notes or full list</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178279#M32672</link>
      <description>&lt;P&gt;The command string I provided only works in Expert mode.&lt;BR /&gt;clish commands don't support piping to other commands, nor does mgmt (the clish equivalent of mgmt_cli) support the -r true flag.&lt;/P&gt;
&lt;P&gt;My understanding is threat-protections should include protections from other blades (not just IPS).&lt;BR /&gt;However,&amp;nbsp;a lot of AV/AB protections are handled in ThreatCloud and won't appear in the API output.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 16:59:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-AV-signature-release-notes-or-full-list/m-p/178279#M32672</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-17T16:59:50Z</dc:date>
    </item>
  </channel>
</rss>

