<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Harmony Endpoint Firewall default settings in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/276240#M11420</link>
    <description>&lt;P&gt;There's nobody manging security for their organisation, that has the expectation that whole public internet should be in a default "Trusted Zone". If this does indeed work out-of-the-box as described above, then this is a bad default that needs correcting.&lt;/P&gt;&lt;P&gt;There are a lot of Checkpoint "defaults" that are not fit for purpose in 2026 (Remote Access default ciphers come immediately to mind). I get that you don't won't to break stuff, but it doesn't need to be like this for fresh installs - preserving existing setting during an upgrade is an different matter entirely.&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2026 10:39:50 GMT</pubDate>
    <dc:creator>ccsjnw</dc:creator>
    <dc:date>2026-04-29T10:39:50Z</dc:date>
    <item>
      <title>Harmony Endpoint Firewall default settings</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/274785#M11387</link>
      <description>&lt;P&gt;I've been troubleshooting an issue where the endpoint firewall is blocking traffic and this got me digging into the settings for the firewall and I discovered that the default settings are basically wide open, anything in, anything out!&lt;/P&gt;&lt;P&gt;This surprised me as even the Microsoft windows firewall blocks incoming traffic by default.&lt;/P&gt;&lt;P&gt;The policy itself at first glance looks ok:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Default Policy.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33923i36F11428FDEDB46B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Default Policy.png" alt="Default Policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The problem relates to the zones, the internet zone is everything that's not in the trusted zone, but the trusted zone, by default, looks like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Trusted Zone.png" style="width: 403px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33924i0BBA3824F27525C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="Trusted Zone.png" alt="Trusted Zone.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I've not seen this documented anywhere and there is no mention of it in the course book for the CCES either!&lt;/P&gt;&lt;P&gt;I'm wondering how many people have deployed this on the assumption that it's default settings are safe!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2026 19:39:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/274785#M11387</guid>
      <dc:creator>StevePearson</dc:creator>
      <dc:date>2026-04-02T19:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Firewall default settings</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/274833#M11388</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/58202"&gt;@StevePearson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe the initial idea is to free everything up, even with the "cleanup" rule in the inbound lane. This is to avoid problems with firewall implementation and prevent the issue of blocking what was working, especially the inbound rule. In most organizations, inbound and outbound rules are perimeter firewall implementations. In some cases, there are rules for employees outside the company. Following this same idea, I'm implementing microsegmentation rules in the subnets within the organization to achieve this security.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2026 20:28:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/274833#M11388</guid>
      <dc:creator>lluner</dc:creator>
      <dc:date>2026-04-03T20:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: Harmony Endpoint Firewall default settings</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/276240#M11420</link>
      <description>&lt;P&gt;There's nobody manging security for their organisation, that has the expectation that whole public internet should be in a default "Trusted Zone". If this does indeed work out-of-the-box as described above, then this is a bad default that needs correcting.&lt;/P&gt;&lt;P&gt;There are a lot of Checkpoint "defaults" that are not fit for purpose in 2026 (Remote Access default ciphers come immediately to mind). I get that you don't won't to break stuff, but it doesn't need to be like this for fresh installs - preserving existing setting during an upgrade is an different matter entirely.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 10:39:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Harmony-Endpoint-Firewall-default-settings/m-p/276240#M11420</guid>
      <dc:creator>ccsjnw</dc:creator>
      <dc:date>2026-04-29T10:39:50Z</dc:date>
    </item>
  </channel>
</rss>

