<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AV blade/user check/windows updates in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244624#M47603</link>
    <description>&lt;P&gt;I don't fully understand the issue, but here is what I can see&lt;/P&gt;
&lt;P&gt;screenshot 1, I would the recommended bypass object listed in this SK:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk163595" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk163595&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Screenshot 7 rule 1 this rule will not match the traffic becuase it is set to N/A.&lt;BR /&gt;Therefore it will not hit the blades. I would recommend to right click it and add the blades you want to exclude(in this case AV)&lt;/P&gt;</description>
    <pubDate>Mon, 24 Mar 2025 21:27:56 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2025-03-24T21:27:56Z</dc:date>
    <item>
      <title>AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244464#M47580</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;Figured would share this, since customer and I had been working with TAC escalation guy for couple weeks and he told us would probably open a task with R&amp;amp;D to see if there is a way to make block page come up every time when specific file types are blocked (in our case msi and exe). Its somewhat inconsistent at this point, since random sites dont show block pages when msi file is blocked and some are even allowed. I will update once we have fully working solution, but in the meantime, figured would share some screenshos that can hopefully help others if you find yourself in similar situation.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2025 00:17:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244464#M47580</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-23T00:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244624#M47603</link>
      <description>&lt;P&gt;I don't fully understand the issue, but here is what I can see&lt;/P&gt;
&lt;P&gt;screenshot 1, I would the recommended bypass object listed in this SK:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk163595" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk163595&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Screenshot 7 rule 1 this rule will not match the traffic becuase it is set to N/A.&lt;BR /&gt;Therefore it will not hit the blades. I would recommend to right click it and add the blades you want to exclude(in this case AV)&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:27:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244624#M47603</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-03-24T21:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244625#M47604</link>
      <description>&lt;P&gt;Hey Lesley,&lt;/P&gt;
&lt;P&gt;We had problem where windows updates were not working when msi and exe files were blocked through AV blade.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 21:30:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244625#M47604</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T21:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244632#M47608</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;maybe you could try to add in DST Updateble Object of recommended by CP HTTPS inspection bypass for Microsoft updates? It seems to be quite accurate in my use cases. Of course it might be sometimes to wide, but MS seems to be unpredictable in some ways &lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt; Maybe good old manually defined URLs would do the job?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 22:10:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244632#M47608</guid>
      <dc:creator>JaAnd</dc:creator>
      <dc:date>2025-03-24T22:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244634#M47610</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/79692"&gt;@JaAnd&lt;/a&gt;&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Yes, thats what we did, just added microsoft defender and it worked. Regardless, blocking files and showing block page is absolutely needed and it has to work CONSTANTLY, which sadly, is far from what happens now.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 22:17:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244634#M47610</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T22:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: AV blade/user check/windows updates</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244641#M47614</link>
      <description>&lt;P&gt;For what its worth, TAC guy originally had us add akamai, cloudflare and github to bypass, but though that fixed windows updates, it broke few sites for ssl inspection.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 23:24:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AV-blade-user-check-windows-updates/m-p/244641#M47614</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-24T23:24:47Z</dc:date>
    </item>
  </channel>
</rss>

