<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking php iframe  content with a policy in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Blocking-php-iframe-content-with-a-policy/m-p/150348#M5741</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I wonder if it is possible to block in a Checkpoint Firewall the content of a Web Site (for example&amp;nbsp; &lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/path/home.php&amp;nbsp;&lt;/A&gt;which uses iframe.&lt;/P&gt;&lt;P&gt;I can activate https inspection inbound&amp;nbsp; to Web server, and I know the "iframe URL" which launches the content, for example:&lt;/P&gt;&lt;P&gt;&lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/random_path/myiframe.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to block that content without blocking the original url (&lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/path/home.php &lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jun 2022 14:09:22 GMT</pubDate>
    <dc:creator>mrodriguez</dc:creator>
    <dc:date>2022-06-07T14:09:22Z</dc:date>
    <item>
      <title>Blocking php iframe  content with a policy</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Blocking-php-iframe-content-with-a-policy/m-p/150348#M5741</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I wonder if it is possible to block in a Checkpoint Firewall the content of a Web Site (for example&amp;nbsp; &lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/path/home.php&amp;nbsp;&lt;/A&gt;which uses iframe.&lt;/P&gt;&lt;P&gt;I can activate https inspection inbound&amp;nbsp; to Web server, and I know the "iframe URL" which launches the content, for example:&lt;/P&gt;&lt;P&gt;&lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/random_path/myiframe.php&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way to block that content without blocking the original url (&lt;A href="https://domain.com/random_path/myiframe.php" target="_blank"&gt;https://domain.com/path/home.php &lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 14:09:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Blocking-php-iframe-content-with-a-policy/m-p/150348#M5741</guid>
      <dc:creator>mrodriguez</dc:creator>
      <dc:date>2022-06-07T14:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking php iframe  content with a policy</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Blocking-php-iframe-content-with-a-policy/m-p/150360#M5742</link>
      <description>&lt;P&gt;I guess you can define a new WebApp and do an regexp on that particular iFrame and block it .&lt;/P&gt;&lt;P&gt;Give it a try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ty,&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 15:36:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Blocking-php-iframe-content-with-a-policy/m-p/150360#M5742</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-07T15:36:42Z</dc:date>
    </item>
  </channel>
</rss>

