<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password Reuse testing in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22052#M3693</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured Protected Domains by chance?&lt;/P&gt;&lt;P&gt;Credentials entered in these sites on a web browser&amp;nbsp;are the ones that are tracked.&lt;/P&gt;&lt;P&gt;Refer to:&amp;nbsp;&lt;A class="link-titled" href="http://downloads.checkpoint.com/dc/download.htm?ID=53788" title="http://downloads.checkpoint.com/dc/download.htm?ID=53788"&gt;R77.30.03 Endpoint Security Administration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Jan 2018 18:13:48 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-01-10T18:13:48Z</dc:date>
    <item>
      <title>Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22051#M3692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need to test #password_reuse function on SandBlast Agent for browser, but I can not find enough information about it. My client computer is in AD domain, I've&amp;nbsp; entered into my internal RDWeb Access page with AD credentials few times to make my Agent store my password, but I still can use it anywhere in internet without alerting or logging. What makes SBA for browser record my internal password and in what&amp;nbsp;situation&amp;nbsp;it would alert/log? (Policy is&amp;nbsp;configured correctly and SandBlast Agent for browser is installed automaticaly after installing SandBlast Agent dwonloaded from SmartEndpoint Server -&amp;gt; Packages For Export.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 08:50:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22051#M3692</guid>
      <dc:creator>Serhii_Yaholnyt</dc:creator>
      <dc:date>2018-01-10T08:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22052#M3693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured Protected Domains by chance?&lt;/P&gt;&lt;P&gt;Credentials entered in these sites on a web browser&amp;nbsp;are the ones that are tracked.&lt;/P&gt;&lt;P&gt;Refer to:&amp;nbsp;&lt;A class="link-titled" href="http://downloads.checkpoint.com/dc/download.htm?ID=53788" title="http://downloads.checkpoint.com/dc/download.htm?ID=53788"&gt;R77.30.03 Endpoint Security Administration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 18:13:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22052#M3693</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-10T18:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22053#M3694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&amp;nbsp;my Domain is in&amp;nbsp;Protected Domains list in Zero Phishing settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 08:12:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22053#M3694</guid>
      <dc:creator>Serhii_Yaholnyt</dc:creator>
      <dc:date>2018-01-11T08:12:03Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22054#M3695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Serhii,&lt;BR /&gt;please find bellow the information about the Password Reuse functionality and use:&lt;/P&gt;&lt;P class="" style="color: #6d6e71; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;The basic flow of the “Password Reuse” feature is as follows:&lt;/P&gt;&lt;OL style="color: #6d6e71; background-color: #ffffff; font-size: 14px; margin: 10px 0px 0px;"&gt;&lt;LI&gt;The admin defines the protected corporate domains in SBA4B policy.&lt;/LI&gt;&lt;LI&gt;A user submits his/her credentials in a form that belongs to one of the protected domains.&lt;/LI&gt;&lt;LI&gt;The password hash will be taken (sha256, hmac) and saved in local browser storage&lt;/LI&gt;&lt;LI&gt;Once the user will use the same password in a non-protected domain, the system will trigger according to configuration (log, usercheck)&lt;BR /&gt;&lt;BR /&gt;It is importent to note point#2 - the user must enter his credentials of the protected domain &lt;STRONG&gt;after&lt;/STRONG&gt; the domain was add to the protected domains, and the configuration was synced to the extension.&lt;BR /&gt;there is no integration with AD, so the extension "learns" the password it needs to protect once the user type them in the a protected domain web site&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2018 06:51:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22054#M3695</guid>
      <dc:creator>Ziv_Sahar</dc:creator>
      <dc:date>2018-01-15T06:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22055#M3696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Ziv&lt;BR /&gt;I have configured SBA4B policy, added my domain to pretected domains list, made my computer a domain member and after that installed CheckPoint SBA4B on my machine (with installer which was downloaded from SmartEndpoint Server). Is it possible that SBA4B does not recognize site as protected domain's one if there is an error with certificate or if I address it with IP in URL string?&lt;BR /&gt;&lt;BR /&gt;Thank You for answering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2018 07:31:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22055#M3696</guid>
      <dc:creator>Serhii_Yaholnyt</dc:creator>
      <dc:date>2018-01-15T07:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22056#M3697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;The extension domain need an exact domain match according to the protected domain list,&lt;BR /&gt;if you will use IP instead of the domain name the password reuse will not be triggered.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jan 2018 09:48:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22056#M3697</guid>
      <dc:creator>Ziv_Sahar</dc:creator>
      <dc:date>2018-01-17T09:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22057#M3698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Ziv!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tell me, please, if we clear browser cache - will SandBlast Extension&amp;nbsp;recognize the domain password,&amp;nbsp;or we need to re-enter it on the domain site again?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:15:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22057#M3698</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-01-31T16:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22058#M3699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure the answer to this is no as it wouldn't make sense to use the browser cache for this (which may not cache the password anyway).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Jan 2018 17:02:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22058#M3699</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-31T17:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22059#M3700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Olga,&lt;/P&gt;&lt;P&gt;clearing the browser cache won't delete the extension data, so the extension will still recognize the domain passwords&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2018 11:55:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22059#M3700</guid>
      <dc:creator>Ziv_Sahar</dc:creator>
      <dc:date>2018-02-04T11:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22060#M3701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Anyone who knows how to "exclude" domain. For example. The user have the same password in the local domain and in "portal.office.com" (Office 365 login portal) &lt;BR /&gt;That is because the local AD syncs credentials with MS 365.&lt;/P&gt;&lt;P&gt;So they have to use the same credentials on local domain and MS 365.&lt;BR /&gt;So when the user tries to logon to Office 365 portal, they get the message saying they are using corporate password... and they have to do that....&lt;/P&gt;&lt;P&gt;So if anyone know a way to exclude some domain (white list) it would be good..&lt;/P&gt;&lt;P&gt;Thanks, Tobias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Feb 2019 15:43:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22060#M3701</guid>
      <dc:creator>Tobias_Karsbo</dc:creator>
      <dc:date>2019-02-06T15:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22061#M3702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My misunderstanding.&lt;/P&gt;&lt;P&gt;Just add those domains in "Protected Domains" and it will work just fine &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Mar 2019 12:13:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/22061#M3702</guid>
      <dc:creator>Tobias_Karsbo</dc:creator>
      <dc:date>2019-03-01T12:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: Password Reuse testing</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/89484#M3703</link>
      <description>&lt;P&gt;I was looking for something related to this and tripped over this thread.&lt;/P&gt;&lt;P&gt;Just in case anyone else looking to make the password re-use protection feature work properly for Office 365 - as in making Office 365 authentication be the 'trusted' side for the corporate credentials - either synchronised with the on premises AD or stand-alone - it doesn't really matter which, trusted is trusted&lt;/P&gt;&lt;P&gt;The portal.office.com FQDN redirects to the basic 'office.com' so doesn't really play a key part.&lt;/P&gt;&lt;P&gt;The domains that you need to put in to the 'trusted domains section of the 'Zero Phishing Settings' 'protected domains' list are:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;login.microsoftonline.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;office.com&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Very possibly &lt;STRONG&gt;portal.office.com&lt;/STRONG&gt; (I don't believe so but just in case, and it'll do no harm to add it)&lt;/P&gt;&lt;P&gt;Just today I did a step by step test on a new implementation and tried just using login.microsoftonline.com; this was &lt;STRONG&gt;*not*&lt;/STRONG&gt; sufficient for the zero phishing to hash the password, even though it redirects to that FQDN prior the the user typing in the login name and password - &lt;STRONG&gt;office.com&lt;/STRONG&gt; is essential too!&lt;/P&gt;&lt;P&gt;Funny old thing Microsoft authentication - but add these two to the protected domains and it works a treat! Everyone who sees this for the first time is impressed, just try logging on to any other site with the same credentials after logging in (on a browser) and when the new browser tab opens with the warning about how this is not a secure practice there is always a gasp from the person watching!&lt;/P&gt;&lt;P&gt;Lovely piece of technology, nice work Check Point!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jun 2020 21:48:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Password-Reuse-testing/m-p/89484#M3703</guid>
      <dc:creator>John_Fenoughty</dc:creator>
      <dc:date>2020-06-22T21:48:20Z</dc:date>
    </item>
  </channel>
</rss>

