<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restrict Access to MS Active Directory Services in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10923#M91454</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If an Application Control signature exists, you should use it.&lt;/P&gt;&lt;P&gt;In terms of the ports allowed, they are identical.&lt;/P&gt;&lt;P&gt;The signature does provide extra checking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 28 Oct 2018 13:54:11 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-10-28T13:54:11Z</dc:date>
    <item>
      <title>Restrict Access to MS Active Directory Services</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10920#M91451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to know what Service object do you prefer to use to r&lt;SPAN&gt;estrict access to Active Directory services.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In Application Control Blade there is a Application signature "Active Directory"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG alt="Active Directory Object" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72915_AD_object.PNG" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;policy rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG alt="policy" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72916_access_policy.PNG" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or&amp;nbsp; do you prefer to place in Service &amp;amp; Application column all needed services:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="policy2" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72917_access_policy2.PNG" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which one is the more secure ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2018 07:41:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10920#M91451</guid>
      <dc:creator>s_milidrag</dc:creator>
      <dc:date>2018-10-28T07:41:37Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Access to MS Active Directory Services</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10921#M91452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The answer would depend on how your LDAP server has been configured. If the server listens on TCP and UDP port 389, which is the default configuration, then you would have to include the following services:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap_udp(UDP/389)&lt;/P&gt;&lt;P&gt;ldap(TCP/389)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your question is about which is the most secure protocol, then the answer would be ldap-ssl(TCP/636) as it will allow LDAP-related traffic to be encrypted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again though, the service selected will depend on your LDAP server's configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2018 10:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10921#M91452</guid>
      <dc:creator>Nick_Doropoulos</dc:creator>
      <dc:date>2018-10-28T10:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Access to MS Active Directory Services</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10922#M91453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Nicholas,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks you for your answer,&lt;/P&gt;&lt;P&gt;Maybe I was not so clear.&lt;/P&gt;&lt;P&gt;There is Application Signature "Active Directory" which should recognized all Active Directory services (tcp/135, tcp/138, ldap_udp, ldap, Kerberos, nbname ......)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So my question is what is more secure/preferable to use in Services &amp;amp; Applications&amp;nbsp;&lt;/SPAN&gt;column:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="policy3" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72919_access_policy.PNG" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="policy4" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/72920_access_policy2.PNG" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2018 12:32:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10922#M91453</guid>
      <dc:creator>s_milidrag</dc:creator>
      <dc:date>2018-10-28T12:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Access to MS Active Directory Services</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10923#M91454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If an Application Control signature exists, you should use it.&lt;/P&gt;&lt;P&gt;In terms of the ports allowed, they are identical.&lt;/P&gt;&lt;P&gt;The signature does provide extra checking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Oct 2018 13:54:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/10923#M91454</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-10-28T13:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: Restrict Access to MS Active Directory Services</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/204556#M91455</link>
      <description>&lt;P&gt;I wish it could work properly, but it doesn't.&lt;/P&gt;&lt;P&gt;I created two rules, the first one allowing active directory application.&lt;/P&gt;&lt;P&gt;The second rules allow all Microsoft services.&lt;/P&gt;&lt;P&gt;The second rule matches more times than the first one.&lt;/P&gt;&lt;P&gt;Finally, I has to open by services.&lt;/P&gt;&lt;P&gt;Does anybody has the expected result?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 13:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Restrict-Access-to-MS-Active-Directory-Services/m-p/204556#M91455</guid>
      <dc:creator>Ilovecheckpoint</dc:creator>
      <dc:date>2024-01-30T13:32:26Z</dc:date>
    </item>
  </channel>
</rss>

