<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPS Core Protection in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221724#M54141</link>
    <description>&lt;P&gt;Depends on your Threat Prevention profile/configuration.&lt;BR /&gt;The Optimized profile (which is the default one) has several protections either Disabled or in Detect mode.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jul 2024 18:28:16 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-07-23T18:28:16Z</dc:date>
    <item>
      <title>IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221662#M54135</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have a question about the Threat Prevention custom policy, specifically the IPS protection section. For the core Protection, there are two options. For example, if you see Host Port Scan for each profile, the action is either "Accept" or "Inactive." However, for other core protections, such as HTTP URL pattern, there is an additional "Drop" option. What do the "Accept," "Inactive," and "Block" actions do, and why is the "Block" action added to some of the core protections?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 08:10:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221662#M54135</guid>
      <dc:creator>Ihenock1011</dc:creator>
      <dc:date>2024-07-23T08:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221687#M54136</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;Those are default IPS protections, regardless if you have IPS blade enabled or not. I would leave those as is, no need to change them, unless you are 100% positive exception needs to be added.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 13:04:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221687#M54136</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-23T13:04:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221689#M54137</link>
      <description>&lt;P&gt;Because for some protections (like anything HTTP related) there is an active connection that gets terminated if they trigger and the “Block” action is specified.&lt;BR /&gt;For protections that don’t involve an active TCP/UDP connection, you won’t see a block action.&lt;/P&gt;
&lt;P&gt;Inactive means the system does not try to look for it.&lt;BR /&gt;Accept means look for it but allow it (ie like a regular IPS protection in Detect mode).&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 13:27:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221689#M54137</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-23T13:27:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221691#M54138</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"Accept means look for it but allow it (ie like a regular IPS protection in Detect mode)"&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Doesn't the IPS prevent in all conditions?&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 23 Jul 2024 14:13:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221691#M54138</guid>
      <dc:creator>Ihenock1011</dc:creator>
      <dc:date>2024-07-23T14:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221692#M54139</link>
      <description>&lt;P&gt;Definitely NOT.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 14:15:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221692#M54139</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-23T14:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221709#M54140</link>
      <description>&lt;P&gt;Btw, you can even examine optimized profile out of the box, which is what CP recommends anyway and bunch of protections are set to inactive/detect.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 16:17:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221709#M54140</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-23T16:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221724#M54141</link>
      <description>&lt;P&gt;Depends on your Threat Prevention profile/configuration.&lt;BR /&gt;The Optimized profile (which is the default one) has several protections either Disabled or in Detect mode.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 18:28:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221724#M54141</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-23T18:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221742#M54142</link>
      <description>&lt;P&gt;Sorry if I am making you bored. What exactly do I have to do, for example, to block HTTP URL patterns and host port scanning?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 04:45:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221742#M54142</guid>
      <dc:creator>Ihenock1011</dc:creator>
      <dc:date>2024-07-24T04:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221771#M54143</link>
      <description>&lt;P&gt;Check out the example, you just edit the given protection and change the action for the IPS profile you are using.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26964i815B21385D6367A8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_2.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26965i5C5F4B216DBF257A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_2.png" alt="Screenshot_2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 12:00:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221771#M54143</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-07-24T12:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPS Core Protection</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221830#M54144</link>
      <description>&lt;P&gt;For anything HTTP related, HTTPS Inspection is required to see the full URLs.&lt;BR /&gt;This is in addition to enabling the relevant protections and installing the Access Policy.&lt;/P&gt;
&lt;P&gt;Portscans are a little more complicated:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk110873" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk110873&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:54:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPS-Core-Protection/m-p/221830#M54144</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-24T14:54:52Z</dc:date>
    </item>
  </channel>
</rss>

