<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating Malicious URL in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166454#M27732</link>
    <description>&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____6" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____6&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112249" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112249&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jan 2023 09:27:50 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2023-01-02T09:27:50Z</dc:date>
    <item>
      <title>Creating Malicious URL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166452#M27731</link>
      <description>&lt;P&gt;I have checkpoint firewall and when I create custom application/sites by default it creates services like http, https, HTTP_proxy, and HTTPS_proxy and I have two questions regarding this, the first one is what are this services used for in the Application/sites the second is usually I used to block malicious or suspicious urls through this application/sites object category the question is which place is best to place these app/sites groups either on the destination or in the services section on the rule base?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 09:04:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166452#M27731</guid>
      <dc:creator>ihenock101</dc:creator>
      <dc:date>2023-01-02T09:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Malicious URL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166454#M27732</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____6" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Creating-Application-Control-and-URL-Filtering-Rules.htm?tocpath=Creating%20an%20Access%20Control%20Policy%7C_____6&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112249" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112249&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk73220&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 09:27:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166454#M27732</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-01-02T09:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Malicious URL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166466#M27733</link>
      <description>&lt;P&gt;Those services typically represent the default ones to which URL filtering / AppC policy is applied unless you have the non-standard ports option enabled.&lt;/P&gt;
&lt;P&gt;The latter depends on the object type, "domain" objects can be used in the destination of a FW/Access policy but a site/category is typically in the services column depending on the blades enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 12:22:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166466#M27733</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-01-02T12:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Malicious URL</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166482#M27734</link>
      <description>&lt;P&gt;There are a couple different ways to block URLs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Adding them as part of Custom Application/Site objects in the Access Policy (requires a policy install to change)&lt;/LI&gt;
&lt;LI&gt;Using ioc_feeds with the AV/AB Blades:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&amp;amp;partition=Basic&amp;amp;product=Anti-Virus," target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk132193&amp;amp;partition=Basic&amp;amp;product=Anti-Virus,&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;In R81.20, using a Network Feed object:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Network_Feed.htm?Highlight=Network%20feed" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Network_Feed.htm?Highlight=Network%20feed&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;ioc_feeds doesn’t use the Access Policy at all.&lt;BR /&gt;For the other two methods, you can put the relevant object in the Access Policy with appropriate rules to block traffic to and from those IPs.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2023 14:32:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-Malicious-URL/m-p/166482#M27734</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-02T14:32:10Z</dc:date>
    </item>
  </channel>
</rss>

