<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83764#M80465</link>
    <description>&lt;P&gt;Bump.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Apr 2020 17:30:42 GMT</pubDate>
    <dc:creator>Rob_Bush</dc:creator>
    <dc:date>2020-04-30T17:30:42Z</dc:date>
    <item>
      <title>Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83507#M80464</link>
      <description>&lt;P&gt;Lately my firewalls have been getting slammed with Threat Emulation tasks whenever a client reaches out to the Microsoft servers for windows update.&amp;nbsp; It appears my clients are using HTTP to grab files from &lt;A href="http://tlu.dl.delivery.mp.microsoft.com/filestreamingservice" target="_blank"&gt;http://tlu.dl.delivery.mp.microsoft.com/filestreamingservice&lt;/A&gt; and the download is causing TE to kick in and try to emulate the files, which causes increase load on the firewall.&amp;nbsp; I know that I can create a Threat Prevention rule with all the Microsoft IPs/Networks as the Protected Scope and then assign a TP profile with TE/AV turned off, but I really don't want to have to maintain the list of Microsoft's IPs just to have it bypass TE when the URL is very clearly showing in the logs.&amp;nbsp; It doesn't appear you can create a TP profile based on URL's, only scope. I just upgraded to R80.40 on one of my firewalls so I just tried using the new Updatable Objects as part of this. The docs for the updatable objects uses HTTPS inspection exceptions as the example, but I was presuming it could also be used in the Protect Scope column of a TP rule?&amp;nbsp; I tried this, but it is skipping right over my TP rule with TE/AV disabled and is hitting the next rule where TE is still kicking in just like always.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any other way to handle this?&amp;nbsp; I thought I've seen references to a CSV file you can use with URL's loaded in it, but I'm not sure how to do that.&amp;nbsp; I'll I'd really like to do is just bypass TP entirely on selective URL's/domains.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 15:58:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83507#M80464</guid>
      <dc:creator>Rob_Bush</dc:creator>
      <dc:date>2020-04-28T15:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83764#M80465</link>
      <description>&lt;P&gt;Bump.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 17:30:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83764#M80465</guid>
      <dc:creator>Rob_Bush</dc:creator>
      <dc:date>2020-04-30T17:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83934#M80466</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9367"&gt;@Rob_Bush&lt;/a&gt;&amp;nbsp;!&lt;/P&gt;
&lt;P&gt;Yes you can definitely use the Updateable Objects in the Threat Prevention policy as you intuitively understood - in the Protected Scope, Source or Dest columns. You can also use a custom URL exception.&lt;/P&gt;
&lt;P&gt;To help you it'd be great if you can share a screenshot of the policy in question - and I'll help you configure it. You can also do that via a DM but I'd rather it be public so that others can enjoy the question&amp;amp;answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2020 10:16:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/83934#M80466</guid>
      <dc:creator>TP_Master</dc:creator>
      <dc:date>2020-05-03T10:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/84116#M80467</link>
      <description>&lt;P&gt;Thank you so much for being willing to help!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attached is a screenshot of what I attempted.&amp;nbsp; Unfortunately this Threat Prevention rule did not work as I still have TP being engaged on the Microsoft Update traffic (and just to be clear, I am also bypassing this same for HTTPS, but the TP is kicking in on non-HTTPS traffic to Microsoft update, which I'll include a screenshot of as well.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing I can think is that the "Microsoft - recommended HTTPS bypass" updatable object says it is grabbing all IP's related to "*.dl.delivery.mp.microsoft.com" and "*.delivery.mp.microsoft.com" (among the many url's) but this traffic that I'm seeing is "&lt;STRONG&gt;2&lt;/STRONG&gt;.&lt;STRONG&gt;tlu&lt;/STRONG&gt;.dl.delivery.mp.microsoft.com" so it's possible it's not matching because it's one level deeper ("tlu") than the deepest level shown on sk163595?&amp;nbsp; I wasn't sure how the wildcard on the SK matched, and if would require the match to be to "*.&lt;STRONG&gt;tlu&lt;/STRONG&gt;.dl.delivery.mp.microsoft.com" to work?&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2020 16:54:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/84116#M80467</guid>
      <dc:creator>Rob_Bush</dc:creator>
      <dc:date>2020-05-04T16:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/85945#M80468</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8166"&gt;@TP_Master&lt;/a&gt;&amp;nbsp; - Bump.&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 21:21:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/85945#M80468</guid>
      <dc:creator>Rob_Bush</dc:creator>
      <dc:date>2020-05-20T21:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86150#M80469</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9367"&gt;@Rob_Bush&lt;/a&gt;&amp;nbsp; let's try another way.&lt;/P&gt;
&lt;P&gt;Create a custom site with your site&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Custom_site.png" style="width: 627px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6213i11A6A190359D6E43/image-size/large?v=v2&amp;amp;px=999" role="button" title="Custom_site.png" alt="Custom_site.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then add an exception using this newly created object&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Custom_site_exception.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/6214i07E46A950121407E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Custom_site_exception.png" alt="Custom_site_exception.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 10:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86150#M80469</guid>
      <dc:creator>TP_Master</dc:creator>
      <dc:date>2020-05-24T10:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86153#M80470</link>
      <description>&lt;P&gt;Just to mention that in this case there is another, more performance oriented way and it is to use the so called "Null TP Profile". It is essentially profile with all TP blades deactivated and it is described with details in&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;'s Max Power book which I highly recommend.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 11:50:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86153#M80470</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-05-24T11:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86154#M80471</link>
      <description>&lt;P&gt;Creating an exception does not bypass the TP blades, it simply changes the final decision to Inactive or Detect.&amp;nbsp; I suppose this approach could be construed as "bypassing" them since traffic matching the exception cannot be blocked, but that traffic still goes through all the relevant TP blades with the resulting overhead.&amp;nbsp; As Hristo said a null TP profile is the best way to accomplish this.&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 12:01:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86154#M80471</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-24T12:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86350#M80472</link>
      <description>&lt;P&gt;Thanks all.&amp;lt;br&amp;gt;&lt;/P&gt;&lt;P&gt;I'm not sure if you guys looked at the screenshots I put up?&amp;nbsp; I think you'll see I'm attempting to use a Null profile with all blades turned off for the "Microsoft - recommended HTTPS bypass" updatable object.&amp;nbsp; It is not working.&amp;nbsp; (In my screenshot you'll see I named my null profile "Internal_All_Off".)&amp;lt;br&amp;gt;&lt;/P&gt;&lt;P&gt;I'm &lt;U&gt;not&lt;/U&gt; trying to handle this via exceptions as I already know that exceptions serve a different purpose.&amp;lt;br&amp;gt;&lt;/P&gt;&lt;P&gt;I'm guessing you cannot use updatable objects in the "Protect Scope" column of TP profiles, otherwise this traffic would not be hitting the TP blades right now, and yet clearly it is.&amp;nbsp; OR... as I wrote/questioned before...&amp;lt;br&amp;gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;"The only thing I can think is that the "Microsoft - recommended HTTPS bypass" updatable object says it is grabbing all IP's related to "*.dl.delivery.mp.microsoft.com" and "*.delivery.mp.microsoft.com" (among the many url's) but this traffic that I'm seeing is "&lt;STRONG&gt;2&lt;/STRONG&gt;.&lt;STRONG&gt;tlu&lt;/STRONG&gt;.dl.delivery.mp.microsoft.com" so it's possible it's not matching because it's one level deeper ("tlu") than the deepest level shown on sk163595?&amp;nbsp; I wasn't sure how the wildcard on the SK matched, and if would require the match to be to "*.&lt;STRONG&gt;tlu&lt;/STRONG&gt;.dl.delivery.mp.microsoft.com" to work?"&lt;/EM&gt;&amp;lt;br&amp;gt;&lt;/P&gt;&lt;P&gt;I don't have access to a good lab environment to test this out.&amp;nbsp; Is there any chance anyone could try the same in a lab environment and tell me if you get it to work when using updatable objects?&amp;nbsp; It doesn't even have to be the "Microsoft - recommended HTTPS bypass"&amp;nbsp; updatable object, any one of the updatable objects will work just to prove it out.&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2020 14:44:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/86350#M80472</guid>
      <dc:creator>Rob_Bush</dc:creator>
      <dc:date>2020-05-26T14:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/148943#M80473</link>
      <description>&lt;P&gt;Ever got this to work ? it is still doing on 81.10... VERY annoying&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 18:32:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/148943#M80473</guid>
      <dc:creator>Frank_Jacques</dc:creator>
      <dc:date>2022-05-18T18:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200093#M80474</link>
      <description>&lt;P&gt;I'm curious too if you got this to work. I'd still like TP to work but to create exceptions for Microsoft.&lt;/P&gt;&lt;P&gt;I'm getting a lot of logs for cab files to microsoft.com even though we've added a an Global exception.&lt;BR /&gt;&lt;BR /&gt;I'm not using a Null profile though, since I don't want the server to completely bypass TP blade&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23605iE3487E93405AF6BE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 00:05:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200093#M80474</guid>
      <dc:creator>r1der</dc:creator>
      <dc:date>2023-12-09T00:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200099#M80475</link>
      <description>&lt;P&gt;You just don't want to see the logs or there is another reason for the exception?&lt;/P&gt;
&lt;P&gt;The verdict returned in those logs is "trusted source" or "file size exceeded" ...&lt;/P&gt;
&lt;P&gt;Refer also:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Threat-Prevention/Bypass-Windows-amp-Office-update-from-TP-AV-amp-Sandboxing/m-p/142870" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Threat-Prevention/Bypass-Windows-amp-Office-update-from-TP-AV-amp-Sandboxing/m-p/142870&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk114522" target="_blank" rel="noopener"&gt;sk114522: Threat Emulation Detect log shows "File exceeded size limit" when an exception is configure for specific traffic&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 12:01:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200099#M80475</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-12-09T12:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200112#M80476</link>
      <description>&lt;P&gt;Tagging&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/9367"&gt;@Rob_Bush&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/70484"&gt;@FrankK&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8166"&gt;@TP_Master&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following blade-based global exception should do what you want.&amp;nbsp; Unlike a protections-based exception which only changes the final verdict (Prevent/Detect) but still performs the full deep inspection, a blade-based exception with an Action of Inactive completely skips processing the matching traffic for the configured TP blades, thus saving large amounts of overhead.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="updates_tp.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23606i0E7D80DAE6E65C2D/image-size/large?v=v2&amp;amp;px=999" role="button" title="updates_tp.png" alt="updates_tp.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2023 14:29:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/200112#M80476</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-12-09T14:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/201221#M80477</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;FONT face="inherit"&gt;I guess &lt;/FONT&gt;it's&lt;FONT face="inherit"&gt;&amp;nbsp;annoying me again because I looked at the Threat Prevention reports and was wondering why&amp;nbsp;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN&gt;the amount of the logs is extremely high due to the Threat Emulation. I'll take a look at those threads/SKs again. Apparently, I've been on that thread too due to this activity. &lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tpreport.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23740iCA135DCEDDFA3FB3/image-size/large?v=v2&amp;amp;px=999" role="button" title="tpreport.png" alt="tpreport.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Tpreport2.PNG" style="width: 476px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23741i171FD6899F3ACD0F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Tpreport2.PNG" alt="Tpreport2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 16:47:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/201221#M80477</guid>
      <dc:creator>r1der</dc:creator>
      <dc:date>2023-12-20T16:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: Is it possibly to bypass the Threat Prevention/Emulation blade entirely via URL?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/201243#M80478</link>
      <description>&lt;P&gt;Understood, maybe there is a case for an RFE please raise it with your local SE.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 22:53:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-it-possibly-to-bypass-the-Threat-Prevention-Emulation-blade/m-p/201243#M80478</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-12-20T22:53:22Z</dc:date>
    </item>
  </channel>
</rss>

