<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerability scanning &amp;amp; compliance blade in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142461#M25285</link>
    <description>&lt;P&gt;Compliance its not the same as the vulnerabilities scanning, he would need to do a credentialed scan of the FW with Nessus. Any vulnerabilities would then need to be remediated in order to be in compliance with a specific security framework or internal policy. In case the scan is for the network the firewall shall not be in between as false positives or IPS may block scanning and/or not proper scanning would work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Feb 2022 21:26:41 GMT</pubDate>
    <dc:creator>K_montalvo</dc:creator>
    <dc:date>2022-02-24T21:26:41Z</dc:date>
    <item>
      <title>vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142437#M25281</link>
      <description>&lt;P&gt;Our ISSO wants to do nessus scanning for vulnerabilities even though we already have the compliance blade.&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there any reason not to?&amp;nbsp; Has anyone run into issues with creating a user for nessus &amp;amp; letting it scan the firewall?&amp;nbsp;&amp;nbsp; Is anyone else scanning their firewalls with Nessus?&lt;/P&gt;
&lt;P&gt;I've requested in the past that CP adds CVE to the compliance blade.&amp;nbsp;&amp;nbsp; It seems like it would be an easy and very helpful addition.&amp;nbsp; I know we have the web page that show the CVEs but this way we would also know which ones we've patched.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;message from ISSO&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Show me a report showing vulnerabilities report.&amp;nbsp; However, all I’ve seen are compliance reports.&amp;nbsp; Those are like CIS reports, not vulnerability reports.&amp;nbsp; Very different.&amp;nbsp; However, both are important.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;I’m looking for something that shows the current vulnerabilities (CVE’s) on the system.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;If you can produce that from the firewall not from a checkpoint list I’ll let it go.&amp;nbsp; If not, I really want a verified scan of the Firewall’s OS from Nessus.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 18:44:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142437#M25281</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-02-24T18:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142455#M25283</link>
      <description>&lt;P&gt;Thats a good point...maybe someone can confirm, but I dont believe you would get current vulnerabilities on the system with compliance blade. I will do some lab testing and check for you.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 20:30:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142455#M25283</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-24T20:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142461#M25285</link>
      <description>&lt;P&gt;Compliance its not the same as the vulnerabilities scanning, he would need to do a credentialed scan of the FW with Nessus. Any vulnerabilities would then need to be remediated in order to be in compliance with a specific security framework or internal policy. In case the scan is for the network the firewall shall not be in between as false positives or IPS may block scanning and/or not proper scanning would work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Feb 2022 21:26:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142461#M25285</guid>
      <dc:creator>K_montalvo</dc:creator>
      <dc:date>2022-02-24T21:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142464#M25287</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Did you work with your local SE to open an RFE for this?&lt;BR /&gt;(For awareness there is also some coverage here in other areas e.g. PRO support.)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As your ISSO and others have highlighted these serve different purposes. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Though some might also question the usefulness of scanning a Firewall with Nessus, it sounds like independent/external validation is what your after.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 07:26:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142464#M25287</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-02T07:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142494#M25292</link>
      <description>&lt;P&gt;done,&amp;nbsp;&lt;STRONG&gt;o91118xT0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Yeah, CVE scans are different than the compliance blade CIS style reports, but it seems like a perfect add-on to the compliance blade which is already doing scans.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts" target="_blank"&gt;Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and services&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 13:42:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142494#M25292</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-02-25T13:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142496#M25293</link>
      <description>&lt;P&gt;Thats true brother, I mixed up the two : - )&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 13:43:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142496#M25293</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-02-25T13:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142620#M25305</link>
      <description>&lt;P&gt;The only complication I can see is that Nessus recommends the same UID of 0 (the same as the admin user) for the two new users.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.tenable.com/PDFs/Nessus/Scanning_Check_Point_Gaia_with_Tenable_Nessus.pdf" target="_blank"&gt;Scanning Check Point Gaia with Tenable Nessus&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 13:12:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142620#M25305</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2022-02-28T13:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability scanning &amp; compliance blade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142624#M25306</link>
      <description>&lt;P&gt;You should also consider&amp;nbsp;&lt;SPAN&gt;sk100647 when you review your scanning results.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 13:29:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/vulnerability-scanning-amp-compliance-blade/m-p/142624#M25306</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-02-28T13:29:23Z</dc:date>
    </item>
  </channel>
</rss>

