<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automating IPS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5792#M59354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Have you looked at any orchestration tools such as Phantom? &amp;nbsp;We use this for other similar use cases.&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Good luck,&lt;/P&gt;&lt;P class=""&gt;Bobby&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Aug 2017 02:02:38 GMT</pubDate>
    <dc:creator>Bobby_Brill</dc:creator>
    <dc:date>2017-08-30T02:02:38Z</dc:date>
    <item>
      <title>Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5789#M59351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV style="color: #212121; background-color: #ffffff;"&gt;&lt;SPAN style="color: black; font-size: 12pt; font-family: Calibri, sans-serif;"&gt;In short, it would be great if Check Point could interface&amp;nbsp;with a vulnerability scanner to automatically configure IPS rules based off various parameters. Wishful thinking, perhaps?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #212121; background-color: #ffffff;"&gt;&lt;SPAN style="color: black; font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #212121; background-color: #ffffff;"&gt;&lt;SPAN style="color: black; font-size: 12pt; font-family: Calibri, sans-serif;"&gt;For example, lets&amp;nbsp;say anything with a CVSS of 1-4 is inactive, 5-7 is in detect, and 8-10 is protect. You could then run this against the Confidence and Performance Impact of the IPS rules. Say&amp;nbsp;something is a CVSS of 9, Confidence of IPS rule&amp;nbsp;is Low and Performance High, perhaps it will only be in detect mode and only apply to those machines that are vulnerable. Then, if you choose to override it yourself, you can. Over time, as updates are applied, IPS gets trimmed back automatically, and as&amp;nbsp;new vulnerabilities are discovered, IPS also keeps up. &amp;nbsp;This would take things to that next level of enabling JUST what you need automatically.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #212121; background-color: #ffffff;"&gt;&lt;SPAN style="color: black; font-size: 12pt; font-family: Calibri, sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV style="color: #212121; background-color: #ffffff;"&gt;&lt;SPAN style="color: black; font-size: 12pt; font-family: Calibri, sans-serif;"&gt;Are there any products out there that do this, or has anyone tinkered with the API for this?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2017 12:39:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5789#M59351</guid>
      <dc:creator>Mike_Painter</dc:creator>
      <dc:date>2017-08-29T12:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5790#M59352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;R80 and R80.10 provide IPS Tags for this&amp;nbsp;behavior. Read more here: &lt;A href="https://community.checkpoint.com/thread/1386"&gt;How does R80 assist in saving time handling activation of IPS protections?&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58324_tags.png" style="width: 620px; height: 488px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2017 12:49:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5790#M59352</guid>
      <dc:creator>Tomer_Sole</dc:creator>
      <dc:date>2017-08-29T12:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5791#M59353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure how I overlooked that, but this is helpful. I guess now the missing piece is tying this back to a vulnerability scanner, or somehow leveraging the API.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Aug 2017 15:34:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5791#M59353</guid>
      <dc:creator>Mike_Painter</dc:creator>
      <dc:date>2017-08-29T15:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5792#M59354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;Have you looked at any orchestration tools such as Phantom? &amp;nbsp;We use this for other similar use cases.&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Good luck,&lt;/P&gt;&lt;P class=""&gt;Bobby&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Aug 2017 02:02:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5792#M59354</guid>
      <dc:creator>Bobby_Brill</dc:creator>
      <dc:date>2017-08-30T02:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5793#M59355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/58426_pastedImage_1.png" style="width: 620px; height: 241px;" /&gt;&lt;/P&gt;&lt;P&gt;I'd like to point out there are roughly 1700 tags, but I receive an error when adding more than 32. So if you chose to automatically disable CVSS score of 1.0 - 2.9, that is 20 of the 32 available used up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Sep 2017 19:07:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5793#M59355</guid>
      <dc:creator>Mike_Painter</dc:creator>
      <dc:date>2017-09-07T19:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5794#M59356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is something I have been wanting to look into. Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Sep 2017 19:08:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5794#M59356</guid>
      <dc:creator>Mike_Painter</dc:creator>
      <dc:date>2017-09-07T19:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5795#M59357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tomer, is there an update to this thread post Mike's finding of the 32-tag limitation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Dec 2017 23:05:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5795#M59357</guid>
      <dc:creator>VCL001</dc:creator>
      <dc:date>2017-12-04T23:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5796#M59358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/6703"&gt;Tomer Sole&lt;/A&gt;‌ is there an update to the 32-tag limitation? Because this one still exists today!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Sep 2018 07:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5796#M59358</guid>
      <dc:creator>Manuel_Kuback</dc:creator>
      <dc:date>2018-09-28T07:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5797#M59359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;From CPX, if you are on R80.20M2 or R80.30, they now offer something called Smart Threat Profile. It will monitor your traffic and select the IPS that it thinks you need. You can then compare it to your existing policy to choose if you want to use it moving forward. I don't think it's GA yet but you can reach out to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;A href="mailto:threat_smart_profile@checkpoint.com"&gt;threat_smart_profile@checkpoint.com&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2019 16:19:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5797#M59359</guid>
      <dc:creator>Mike_Painter</dc:creator>
      <dc:date>2019-02-12T16:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5798#M59360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds interesting. I just reached out to the mail you provided. Let's see &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I will also attend the CPX in Vienna. Looking forward to it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2019 08:09:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5798#M59360</guid>
      <dc:creator>Manuel_Kuback</dc:creator>
      <dc:date>2019-02-15T08:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5799#M59361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe we'll have a demo of it in the Technology Innovation area.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Feb 2019 23:49:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5799#M59361</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-15T23:49:59Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5800#M59362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We'll be there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Feb 2019 12:03:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/5800#M59362</guid>
      <dc:creator>Omer_Shliva</dc:creator>
      <dc:date>2019-02-16T12:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Automating IPS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/65176#M59363</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I tested the limitation of 32 tags in IPS with R80.20 and R80.30 and it is still the same.&lt;/P&gt;&lt;P&gt;I also could not find any informations about "Smart Threat Profile" in R80.30. So I also asked now in the E-Mail threat_smart_profile@checkpoint.com for more information about it.&lt;/P&gt;&lt;P&gt;When I get updates I will post it here...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Oct 2019 09:12:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Automating-IPS/m-p/65176#M59363</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2019-10-17T09:12:09Z</dc:date>
    </item>
  </channel>
</rss>

