<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get early access to our new Threat Prevention APIs in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/74975#M4372</link>
    <description>no, still not working, we can run it without any command&lt;BR /&gt;&lt;BR /&gt;root@cacti-virtual-machine:/home/cacti# reputation-api&lt;BR /&gt;Usage: reputation-api [OPTIONS]&lt;BR /&gt;Try "reputation-api --help" for help.&lt;BR /&gt;&lt;BR /&gt;Error: Missing option "-s" / "--service". Choose from:&lt;BR /&gt;url,&lt;BR /&gt;file,&lt;BR /&gt;ip.&lt;BR /&gt;&lt;BR /&gt;But with arguments&lt;BR /&gt;root@cacti-virtual-machine:/home/cacti# reputation-api -s url -r &lt;A href="http://www.abc.com" target="_blank"&gt;www.abc.com&lt;/A&gt; -ck XXYYZZ&lt;BR /&gt;api.utils.exceptions.StatusCodeException: Operation failed with status {self.status_code}&lt;BR /&gt;</description>
    <pubDate>Wed, 12 Feb 2020 12:49:20 GMT</pubDate>
    <dc:creator>Martin_Raska</dc:creator>
    <dc:date>2020-02-12T12:49:20Z</dc:date>
    <item>
      <title>Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/55900#M3612</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;Take control of new Threat Prevention APIs powered by the largest Threat Cloud in the industry:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;URL Reputation&lt;/STRONG&gt; – for a domain/URL returns the classification and risk in accessing the resource&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;File Reputation&lt;/STRONG&gt; – for a file digest (md5/sha1/sha256/sha512) returns the risk in downloading the file without the need to scan it&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;IP Reputation&lt;/STRONG&gt; &amp;nbsp;- for an IP address returns it’s classification and risk in accessing a resource hosted on it&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Mail Security&lt;/STRONG&gt; – upload an email for scanning against malware and phishing attacks, based on award winning Sandblast engines&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All APIs are RESTful, simple to use and can be integrated as part of a SOAR application, home-made application and more!&lt;/P&gt;
&lt;P&gt;If you’re a Check Point customer interested in participating in the early availability stage drop me a mail at &lt;A href="mailto:yoav@checkpoint.com" target="_blank"&gt;yoav@checkpoint.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jun 2019 12:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/55900#M3612</guid>
      <dc:creator>Yoav_Lasman</dc:creator>
      <dc:date>2019-06-16T12:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/71720#M4279</link>
      <description>&lt;P&gt;Detailed API instructions including samples in Java/Python can now be found in our GitHub repository.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check it out here -&amp;nbsp;&lt;A href="https://github.com/CheckPointSW/reputation-service-api" target="_blank" rel="noopener"&gt;https://github.com/CheckPointSW/reputation-service-api&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2020 07:56:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/71720#M4279</guid>
      <dc:creator>Yoav_Lasman</dc:creator>
      <dc:date>2020-01-07T07:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/74794#M4358</link>
      <description>&lt;P&gt;There is typo in the python code&lt;/P&gt;&lt;P&gt;rep_res = requests.post(&lt;STRONG&gt;f&lt;/STRONG&gt;'&lt;A href="https://rep.checkpoint.com/{service}-rep/service/v2.0/query?resource={resource" target="_blank"&gt;https://rep.checkpoint.com/{service}-rep/service/v2.0/query?resource={resource&lt;/A&gt;}')&lt;/P&gt;&lt;P&gt;this f char is repeating in code and prevent from compilation. After fix those, its running.&lt;/P&gt;&lt;P&gt;Python v3.6&lt;/P&gt;&lt;P&gt;Click 7.0&lt;/P&gt;&lt;P&gt;Requests 2.22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2020 12:43:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/74794#M4358</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2020-02-11T12:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/74975#M4372</link>
      <description>no, still not working, we can run it without any command&lt;BR /&gt;&lt;BR /&gt;root@cacti-virtual-machine:/home/cacti# reputation-api&lt;BR /&gt;Usage: reputation-api [OPTIONS]&lt;BR /&gt;Try "reputation-api --help" for help.&lt;BR /&gt;&lt;BR /&gt;Error: Missing option "-s" / "--service". Choose from:&lt;BR /&gt;url,&lt;BR /&gt;file,&lt;BR /&gt;ip.&lt;BR /&gt;&lt;BR /&gt;But with arguments&lt;BR /&gt;root@cacti-virtual-machine:/home/cacti# reputation-api -s url -r &lt;A href="http://www.abc.com" target="_blank"&gt;www.abc.com&lt;/A&gt; -ck XXYYZZ&lt;BR /&gt;api.utils.exceptions.StatusCodeException: Operation failed with status {self.status_code}&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Feb 2020 12:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/74975#M4372</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2020-02-12T12:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76937#M4496</link>
      <description>&lt;P&gt;Hi Martin,&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;f&lt;/STRONG&gt; is not a typo. It's a new way to format strings in python and the change introduce in python 3.6 (&lt;A href="https://www.python.org/dev/peps/pep-0498/" target="_blank"&gt;https://www.python.org/dev/peps/pep-0498/&lt;/A&gt;), so if you're running python 3.6, the code should work.&lt;/P&gt;
&lt;P&gt;Once you removed only the&amp;nbsp;&lt;STRONG&gt;f&amp;nbsp;&lt;/STRONG&gt;from your code without changing the strings formats, your code will not work as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We'll update the code to support older versions of python 3.&lt;/P&gt;
&lt;P&gt;Meanwhile, feel free to contact me and I'll be happy to assists you: aviadl@checkpoint.com&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 08:02:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76937#M4496</guid>
      <dc:creator>aviadl</dc:creator>
      <dc:date>2020-03-03T08:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76987#M4499</link>
      <description>Hi Aviadl,&lt;BR /&gt;I dont know what exactly changed but right now I am able to compile your code with Python 3.6 and rep-api is working correctly.&lt;BR /&gt;&lt;BR /&gt;root@cacti-virtual-machine:/home/cacti/REP_API_F# reputation-api -s url -r &lt;A href="http://www.aaa.com" target="_blank"&gt;www.aaa.com&lt;/A&gt; -ck XXZZYY&lt;BR /&gt;&lt;A href="http://www.aaa.com" target="_blank"&gt;www.aaa.com&lt;/A&gt; is Benign with risk 0/100&lt;BR /&gt;</description>
      <pubDate>Tue, 03 Mar 2020 13:41:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76987#M4499</guid>
      <dc:creator>Martin_Raska</dc:creator>
      <dc:date>2020-03-03T13:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76988#M4500</link>
      <description>That's great!</description>
      <pubDate>Tue, 03 Mar 2020 13:43:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/76988#M4500</guid>
      <dc:creator>aviadl</dc:creator>
      <dc:date>2020-03-03T13:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88738#M4952</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;May be I am passing wrong header - but can you help me fixing the typo with reputation-api?&lt;/P&gt;&lt;P&gt;curl -XGET -H Client-Key &lt;A href="https://rep.checkpoint.com/rep-auth/service/v1.0/request" target="_blank"&gt;https://rep.checkpoint.com/rep-auth/service/v1.0/request&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Plus on my Ubuntu 18.04 python3 getting below errors&lt;/P&gt;&lt;P&gt;Traceback (most recent call last):&lt;BR /&gt;File "/usr/local/bin/reputation-api", line 11, in &amp;lt;module&amp;gt;&lt;BR /&gt;load_entry_point('reputation-service-API-client==1.0.1', 'console_scripts', 'reputation-api')()&lt;BR /&gt;File "/usr/local/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 489, in load_entry_point&lt;BR /&gt;return get_distribution(dist).load_entry_point(group, name)&lt;BR /&gt;File "/usr/local/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2852, in load_entry_point&lt;BR /&gt;return ep.load()&lt;BR /&gt;File "/usr/local/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2443, in load&lt;BR /&gt;return self.resolve()&lt;BR /&gt;File "/usr/local/lib/python2.7/dist-packages/pkg_resources/__init__.py", line 2449, in resolve&lt;BR /&gt;module = __import__(self.module_name, fromlist=['__name__'], level=0)&lt;BR /&gt;File "build/bdist.linux-x86_64/egg/api/__main__.py", line 7, in &amp;lt;module&amp;gt;&lt;BR /&gt;File "/usr/local/lib/python2.7/dist-packages/reputation_service_API_client-1.0.1-py2.7.egg/api/utils/exceptions.py", line 2&lt;BR /&gt;def __init__(self, status_code: int, *args: object) -&amp;gt; None:&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 08:06:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88738#M4952</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2020-06-16T08:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88849#M4954</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;For curl, please try this command:&lt;/P&gt;
&lt;LI-CODE lang="c"&gt;curl -X GET 'https://rep.checkpoint.com/rep-auth/service/v1.0/request' -H 'Client-Key: &amp;lt;your client key&amp;gt;'&lt;/LI-CODE&gt;
&lt;P&gt;Replace&amp;nbsp;&lt;STRONG&gt;&amp;lt;your client key&amp;gt;&lt;/STRONG&gt; with your client key &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;for the python error:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Can you write the full command you tried?&lt;/LI&gt;
&lt;LI&gt;Can you make sure you actually running python 3? from the traceback I see that it's running from python 2.7 somehow.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Waiting for your updates,&lt;/P&gt;
&lt;P&gt;Aviad&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 06:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88849#M4954</guid>
      <dc:creator>aviadl</dc:creator>
      <dc:date>2020-06-17T06:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88851#M4955</link>
      <description>&lt;P&gt;Yes I have python 2.7 installed as well along with Python 3.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the main query is I am not able to generate Client-key using curl parameter. How do I generate the ck?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 07:20:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88851#M4955</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2020-06-17T07:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88854#M4956</link>
      <description>&lt;P&gt;You can't generate Client-Key yourself.&lt;/P&gt;
&lt;P&gt;Please contact &lt;A href="mailto:TCAPI_SUPPORT@checkpoint.com" target="_blank"&gt;TCAPI_SUPPORT@checkpoint.com&lt;/A&gt;&amp;nbsp;to get a key&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 14:44:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88854#M4956</guid>
      <dc:creator>aviadl</dc:creator>
      <dc:date>2022-02-02T14:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88856#M4957</link>
      <description>&lt;P&gt;Oh - I misread probably then &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So I need a ck and based on this I can generate the token which is valid for a week right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 07:47:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88856#M4957</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2020-06-17T07:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Get early access to our new Threat Prevention APIs</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88857#M4958</link>
      <description>&lt;P&gt;Yes&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 07:49:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/Get-early-access-to-our-new-Threat-Prevention-APIs/m-p/88857#M4958</guid>
      <dc:creator>aviadl</dc:creator>
      <dc:date>2020-06-17T07:49:38Z</dc:date>
    </item>
  </channel>
</rss>

