<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Will CheckPoint Firewall AV Blade Block Eicar? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82971#M56673</link>
    <description>&lt;P&gt;Thanks for the response. This confirms what I believed was happening (IPS blade is preventing before the AV).&lt;/P&gt;&lt;P&gt;My only concern about this is if something outside of a known test venue (eicar.org) were to occur over a 80/443 session, that a user would have no knowledge other than to contact support in the organization about a problem with retrieving a file. I guess what I am interested in achieving is a UserCheck notification under these conditions where TP is enacted. As it stands, if I understand this correctly, there is no way for the end user to understand it is being blocked. Outside of this particular scenario (Eicar.org) potentially some other malicious site could present this and the user's perception is there is a network related issue versus a warning about protecting them from themselves. I don't fancy putting in exceptions for them on a case by case bases.&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Apr 2020 16:56:18 GMT</pubDate>
    <dc:creator>jbfixurpc</dc:creator>
    <dc:date>2020-04-23T16:56:18Z</dc:date>
    <item>
      <title>Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82796#M56667</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will CheckPoint Firewall AV Blade Block Eicar?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just enable the AV blade with Web inspection Published and Installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then download the Eicar Virus Test file from only "HTTP" - Not the HTTPS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And the file is able downloaded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I doing things wrong on the CP Threat Prevention?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2020 16:24:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82796#M56667</guid>
      <dc:creator>BlueGrass</dc:creator>
      <dc:date>2020-04-22T16:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82798#M56668</link>
      <description>Eicar has always been kind of a special case, as you can see here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44781" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44781&lt;/A&gt;&lt;BR /&gt;That said, if you're not using Traditional AV and you're on R80.x, I believe it should block this, assuming you're using one of the standard Threat Prevention policies and AV blade is enabled.&lt;BR /&gt;Which suggests a TAC case might be in order.</description>
      <pubDate>Wed, 22 Apr 2020 16:41:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82798#M56668</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-22T16:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82822#M56669</link>
      <description>&lt;P&gt;IPS is the blade that actually detects Eicar. Enable it and it will catch it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Apr 2020 17:51:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82822#M56669</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-22T17:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82925#M56670</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I am observing that the IPS blade does block this. The only problem I have in this scenario is that the user doesn't seem to be getting notified of this, i.e. end user gets a page simply stating &lt;A href="http://www.eicar.org" target="_blank"&gt;www.eicar.org&lt;/A&gt;&amp;nbsp;didn't send any data. Problem is that the users will believe there is a network connection issue or the like and not get information about the block, such as there is a problem with this download and to contact the helpdesk.&lt;/P&gt;&lt;P&gt;Since the IPS blade seems to pick it up, and not the anti-virus I don't seem to have a way to present a block page of any sort (ask is not an option with IPS).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts on how to handle this? Or would this be a unique situation only liken to eicar's ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 13:02:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82925#M56670</guid>
      <dc:creator>jbfixurpc</dc:creator>
      <dc:date>2020-04-23T13:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82952#M56671</link>
      <description>&lt;P&gt;I don't think the IPS blade has the capability to issue a UserCheck like the other Threat Prevention blades can, and I believe IPS takes precedence over the AV blade.&amp;nbsp; I would suggest modifying the "EICAR AV test file" IPS Protection to Detect or Inactive in the TP profile your gateway is using; that should let EICAR reach the AV blade where a UserCheck can be issued.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 15:49:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82952#M56671</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-23T15:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82969#M56672</link>
      <description>&lt;P&gt;Enabling URL-filter / ApplicationControl and blocking "Spyware / malicious websites" also shows the usercheck page if downloading EICAR test file.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="eicar.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5759i71EB03436BDDEE7D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="eicar.png" alt="eicar.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 16:56:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82969#M56672</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-04-23T16:56:23Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82971#M56673</link>
      <description>&lt;P&gt;Thanks for the response. This confirms what I believed was happening (IPS blade is preventing before the AV).&lt;/P&gt;&lt;P&gt;My only concern about this is if something outside of a known test venue (eicar.org) were to occur over a 80/443 session, that a user would have no knowledge other than to contact support in the organization about a problem with retrieving a file. I guess what I am interested in achieving is a UserCheck notification under these conditions where TP is enacted. As it stands, if I understand this correctly, there is no way for the end user to understand it is being blocked. Outside of this particular scenario (Eicar.org) potentially some other malicious site could present this and the user's perception is there is a network related issue versus a warning about protecting them from themselves. I don't fancy putting in exceptions for them on a case by case bases.&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 16:56:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82971#M56673</guid>
      <dc:creator>jbfixurpc</dc:creator>
      <dc:date>2020-04-23T16:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82972#M56674</link>
      <description>&lt;P&gt;Thanks! Perhaps this will do the trick!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 16:57:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82972#M56674</guid>
      <dc:creator>jbfixurpc</dc:creator>
      <dc:date>2020-04-23T16:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82975#M56675</link>
      <description>&lt;P&gt;I don't think IPS will block any other viruses. In fact, it should not block Eicar either because that way it gives the wrong impression you have A-V protection by just enabling IPS blade which is of course not true.&lt;/P&gt;
&lt;P&gt;So, for all other detected viruses you should actually be getting usercheck alert.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Apr 2020 17:05:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82975#M56675</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-23T17:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82976#M56676</link>
      <description>Agreed. Totally makes sense, thanks for the explanation appreciate it!</description>
      <pubDate>Thu, 23 Apr 2020 17:07:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/82976#M56676</guid>
      <dc:creator>jbfixurpc</dc:creator>
      <dc:date>2020-04-23T17:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/83013#M56677</link>
      <description>&lt;P&gt;You are right Hristo that IPS really shouldn't block EICAR as that is not really its "job", but it still has a signature for it. Allow me to explain why this is this case.&lt;/P&gt;
&lt;P&gt;The IPS blade in its present form was introduced in R70 (it was known as "SmartDefense" in R65 and earlier) and was the original "Threat Prevention" solution.&amp;nbsp; It predated the four other Threat Prevention blades (and APCL) by many major code releases, so prior to the other four TP blades (AV, ABOT, TEmu, TExt) being introduced, IPS served some of their functions.&amp;nbsp; So that's why there were IPS signatures for EICAR (should be the job of AV), P2P file sharing protocols (which should be handled by APCL), and Gator (which should be handled by ABOT).&amp;nbsp; This functional overlap continued through version R77.30, but in version R80.10 IPS was finally integrated alongside the other TP blades in the Threat Prevention policy, and no longer had to be configured separately.&amp;nbsp; This is why if you still have R77.30 gateways using IPS being managed by an R80+ SMS, there is a separate "IPS" policy layer under Threat Prevention, as IPS must still be configured separately from the rest of TP on an R77.30 or earlier gateway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When IPS was "rolled up" alongside the other TP blades in the mainline Threat Prevention policies in R80.10+, Check Point took that opportunity to get rid of most of the overlaps between IPS and the other blades, and this arduous task was documented here:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk103766&amp;amp;partition=Advanced&amp;amp;product=IPS" target="_blank" rel="noopener"&gt;sk103766: List of &lt;STRONG&gt;IPS&lt;/STRONG&gt; &lt;STRONG&gt;Protections&lt;/STRONG&gt; removed in R80.x&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Not really sure why the EICAR signature specifically is still around in the IPS blade though.&lt;/P&gt;
&lt;P&gt;Additionally, in R80.10 Check Point split out the IPS "Geo Protection" signature into "Geo Policy" which became a part of the Access Policy (Firewall blade essentially), other certain IPS signatures became part of the Inspection Settings (once again part of the Access Policy - Firewall Blade).&amp;nbsp; This left the IPS ThreatCloud Protections (many thousands of them) as still part of IPS Threat Prevention along with the oddball 39 "Core" IPS Protections, which kind of have one foot in Threat Prevention and the other in Inspection Settings, which leads to some unusual procedures being required to properly configure and define exceptions for them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 12:05:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/83013#M56677</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-24T12:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Will CheckPoint Firewall AV Blade Block Eicar?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/83015#M56678</link>
      <description>&lt;P&gt;Awesome explanation as usual, thanx.&lt;/P&gt;
&lt;P&gt;IPS place in the whole picture is not yet quite clear to me. For example, if I block country via geo object I am expecting that the first thing it will do is to drop connections from this country right away when they arrive. Not really. I still see in the log IPS attacks from this country.&amp;nbsp; So, unless logging somehow reports wrong country I do not understand why it does that.&lt;/P&gt;
&lt;P&gt;Then, as you mention in your book, Geo Policy will likely be dropped in future releases in favor of geo objects. One policy less to configure &lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Inspection Settings is kind of too general name for what it does but that's just my opinion and not a real issue.&lt;/P&gt;
&lt;P&gt;I suspect Eicar was left in IPS sdatabase as an easy way to test if IPS blade signatures work. And indeed it kind of overlaps with the one in AV database but imho the right way to test your blades nowadays is to use CheckMe service.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 04:03:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Will-CheckPoint-Firewall-AV-Blade-Block-Eicar/m-p/83015#M56678</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-04-24T04:03:07Z</dc:date>
    </item>
  </channel>
</rss>

