<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with fail open settings in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220860#M42282</link>
    <description>&lt;P&gt;What Phoneboy stated. Is this the flow?&lt;/P&gt;
&lt;P&gt;Client -&amp;gt; dns request -&amp;gt; DC server -&amp;gt; DC sends DNS requested to it's forward DNS (this traffic will pass via firewall)&lt;/P&gt;
&lt;P&gt;SOC get's logs from firewall and DC? Or only firewall? I think IA blade will see the user's logged into DC. But they have nothing to do with the traffic because it is not send by them. Also I hope users do not login to the actual DC server itself right? (with rdp)&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jul 2024 20:52:27 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2024-07-15T20:52:27Z</dc:date>
    <item>
      <title>Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/219894#M42097</link>
      <description>&lt;P&gt;The current configuration is a fail-open which means that the traffic will be allowed in case the URL will be unknown.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;Changing to a fail-close will have impact on all the environment since all the HTTPS traffic toward website with unknown reputation will be blocked until the checkpoint receive a status on those websites.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are getting bombarded with alerts from SOC, when ever a user logins to a DC, stating that he has accessed a malicious URL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe this is because of the fail-open settings. Is there any customization that can be done to prevent this from happening. Please check and let me know.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of the URL's reported are below,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;media[.]jtdwjcwq6f4wp4ce[.]com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ns1[.]telecom-info[.]com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 09:03:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/219894#M42097</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-08T09:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220003#M42098</link>
      <description>&lt;P&gt;The fail open/closed settings apply when you cannot reach the URL Filtering backend (or some other error related).&lt;BR /&gt;Uncategorized URLs can be blocked, but this is done in the Access Policy.&lt;/P&gt;
&lt;P&gt;One of the URLs reported definitely looks suspicious:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 672px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26649i609D9C90E3970133/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 19:08:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220003#M42098</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-08T19:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220009#M42099</link>
      <description>&lt;P&gt;That is some of the URL's I listed. I think this is happening when ever domain controllers do DNS query. Since we have fail-open setting all the URL's are allowed. Is there a way to specifically block these malicious URL while doing DNS queries. Please let me know.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 19:35:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220009#M42099</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-08T19:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220024#M42100</link>
      <description>&lt;P&gt;I don't get this part:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;when ever a user logins to a DC, stating that he has accessed a malicious URL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How does the drop look on the firewall? I assume it is dropped there? Or how does it look what this SOC is getting?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2024 21:30:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220024#M42100</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-08T21:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220263#M42142</link>
      <description>&lt;P&gt;The Anti-Virus DNS Trap feature.&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk74060" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk74060&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 17:10:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220263#M42142</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-10T17:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220792#M42255</link>
      <description>&lt;P&gt;Most of the connections are dropped but some are being allowed. The problem is we keep getting these alerts from SOC every two days once. Mostly the source points to a Domain controller. And when we checked with the username mentioned by the SOC the user is not aware of visiting any such URL's. The username is captured based on who logged into the DC at that specific duration. I have attached the SOC details for reference.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:14:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220792#M42255</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-15T14:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220793#M42256</link>
      <description>&lt;P&gt;Thank you so much. I will try this and let you know if it works.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220793#M42256</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-15T14:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220858#M42279</link>
      <description>&lt;P&gt;I assume this Domain Controller is used by your clients as their DNS server.&lt;BR /&gt;Unless the gateway can see the client making the DNS request, it has no way of knowing who made the request in this case.&lt;BR /&gt;It logs the information it has at the time, namely whichever admin is logged into the system at the time.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 20:45:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220858#M42279</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-15T20:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220860#M42282</link>
      <description>&lt;P&gt;What Phoneboy stated. Is this the flow?&lt;/P&gt;
&lt;P&gt;Client -&amp;gt; dns request -&amp;gt; DC server -&amp;gt; DC sends DNS requested to it's forward DNS (this traffic will pass via firewall)&lt;/P&gt;
&lt;P&gt;SOC get's logs from firewall and DC? Or only firewall? I think IA blade will see the user's logged into DC. But they have nothing to do with the traffic because it is not send by them. Also I hope users do not login to the actual DC server itself right? (with rdp)&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 20:52:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/220860#M42282</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-07-15T20:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221073#M42328</link>
      <description>&lt;P&gt;Yes this is absolutely right. That is what happening and we are unable to see who is making those DNS requests&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 15:01:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221073#M42328</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-17T15:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221074#M42329</link>
      <description>&lt;P&gt;The flow is correct. The log source is only from Firewall. People login to DC using RDP. That's when these DNS queries are taking place.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 15:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221074#M42329</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-17T15:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221116#M42335</link>
      <description>&lt;P&gt;For any system where multiple users are involved, you need to install the Multi-User Host agent (MUHv2).&lt;BR /&gt;Whether they should be logging directly into the Domain Controller is a separate question.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 18:13:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221116#M42335</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-17T18:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221117#M42336</link>
      <description>&lt;P&gt;Thanks for the response. So, the only option to see who is making those DNS requests is through gateway. Please advise.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 18:22:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221117#M42336</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-17T18:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221118#M42337</link>
      <description>&lt;P&gt;Just curious, did this ever work right with the same settings...or no?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 18:26:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221118#M42337</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-17T18:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221119#M42338</link>
      <description>&lt;P&gt;I am not sure. I joined this organization recently and I am onboarding systems to our new SOC vendor. That's when I started to see these alerts. But I am unable to find anything in firewall. However, when the email comes from SOC they say the log source is checkpoint.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 18:28:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221119#M42338</guid>
      <dc:creator>Jagan23</dc:creator>
      <dc:date>2024-07-17T18:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221120#M42339</link>
      <description>&lt;P&gt;I would follow what Phoneboy gave...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk74060" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk74060&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 18:34:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221120#M42339</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-17T18:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with fail open settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221127#M42340</link>
      <description>&lt;P&gt;If you want to see who made a specific DNS request, that request must traverse the gateway before it reaches the DNS server (either internal or external).&lt;BR /&gt;And, of course, Identity Awareness is configured and working.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 22:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-with-fail-open-settings/m-p/221127#M42340</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-17T22:00:20Z</dc:date>
    </item>
  </channel>
</rss>

