<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Logs in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170423#M28366</link>
    <description>&lt;P&gt;It's a slightly different use case than the log you've provided and not relevant here based on version (sorry for the confusion).&lt;/P&gt;
&lt;P&gt;In your case the reason for this specific case is displayed as shown in the log card (highlighted in yellow).&lt;/P&gt;
&lt;P&gt;Others may have the same cause or again be based on the profile configuration parameters.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See also:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk92224&amp;amp;partition=Advanced&amp;amp;product=Anti-Bot," target="_blank" rel="noopener"&gt;sk92224: Optimizing the categorization of DNS traffic by changing the Resource&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Classification&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Mode, for Anti-Virus and Anti-Bot&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2023 12:19:08 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2023-02-06T12:19:08Z</dc:date>
    <item>
      <title>Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170196#M28321</link>
      <description>&lt;P&gt;Hi CP,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm concerning with the logs between Attack Allowed by Policy and Prevented Attacked. Could you please explain me how are different ?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Log_Policy.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19430iEAC761F392727EE6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Log_Policy.PNG" alt="Log_Policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 01:09:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170196#M28321</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-03T01:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170200#M28324</link>
      <description>&lt;P&gt;The above will typically correspond with events who's action is Detect vs Prevent.&lt;/P&gt;
&lt;P&gt;Often this is a configuration/policy decision on the part of the administrator for blades or protections.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 02:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170200#M28324</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-03T02:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170206#M28329</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;If the action is Detect it mean we allow the connection came into the environment ?&amp;nbsp; And there is any impact or high risk with this action ?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 03:03:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170206#M28329</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-03T03:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170207#M28330</link>
      <description>&lt;P&gt;I agree with Chris. If you look at the top and what it says there, it indicates "attacks allowed by policy", so definitely referring to detect vs prevent.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 03:17:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170207#M28330</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-03T03:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170209#M28331</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;If the "Attacks allowed by policy " what will impact to the environment ?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 03:35:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170209#M28331</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-03T03:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170215#M28334</link>
      <description>&lt;P&gt;The Detect action means: it was allowed into the environment due to the specific Threat Prevention profile configuration.&lt;BR /&gt;The precise risk depends on what it was that was detected.&lt;BR /&gt;A Prevent or Block means it was prevented.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 06:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170215#M28334</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-03T06:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170217#M28335</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;indicated it depends on the specific configuration and the event that was detected.&lt;/P&gt;
&lt;P&gt;For example the "Strict" TP profile versus "Optimized" each have different criteria based on confidence/impact/severity&amp;nbsp; and enabled blades.&lt;/P&gt;
&lt;P&gt;The objective here is to achieve a balance between security/performance/false positives relative to your environment and what assets you are protecting.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TP Criteria.PNG" style="width: 604px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19432i083CD0E0A4AE1399/image-size/large?v=v2&amp;amp;px=999" role="button" title="TP Criteria.PNG" alt="TP Criteria.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 06:49:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170217#M28335</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-03T06:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170222#M28338</link>
      <description>&lt;P&gt;If the change all policy to prevent type what it will impact or not ? And what is the best practice and recommendation ?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 07:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170222#M28338</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-03T07:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170269#M28343</link>
      <description>&lt;P&gt;Generalization: Prevent catch-rate will increase at the expense of performance (particularly if you adjust the active protection parameters or enable additional blades).&lt;/P&gt;
&lt;P&gt;Optimized profile is typically a good place to start then you can clone and tune it further per your own requirements.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 14:58:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170269#M28343</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-03T14:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170274#M28344</link>
      <description>&lt;P&gt;If the protection is on Detect already, Prevent will not cost more performance. I tend to use inactive for low confidence instead of detect...&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 14:20:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170274#M28344</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-02-03T14:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170296#M28351</link>
      <description>&lt;P&gt;From a "work" standpoint, Prevent and Detect require the same amount of work.&amp;nbsp;&lt;BR /&gt;Detect ultimately still allows the traffic, which means it still continues to process the traffic.&lt;BR /&gt;That means Detect could actually end up requiring more work in the end...&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 18:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170296#M28351</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-03T18:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170307#M28352</link>
      <description>&lt;P&gt;Yep Detect causes more overhead than Prevent, and in some cases much more.&amp;nbsp; Here is an excerpt from my new &lt;A href="http://www.maxpowerfirewalls.com" target="_self"&gt;R81.20 Gateway Performance Optimization 2-day course&lt;/A&gt; discussing this topic:&lt;/P&gt;
&lt;DIV id="tinyMceEditor_76c184909d9c06Timothy_Hall_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="preventdetect.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19448iCBE92F80C98724E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="preventdetect.png" alt="preventdetect.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2023 15:58:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170307#M28352</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-02-04T15:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170308#M28353</link>
      <description>&lt;P&gt;You definitely got all the logical answers, so I would stick with optimized profile as Chris said, cant go wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 20:23:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170308#M28353</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-03T20:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170391#M28354</link>
      <description>&lt;P&gt;Could you please explain me more how are different between the Optimized and Strict Action ?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 02:26:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170391#M28354</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-06T02:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170394#M28355</link>
      <description>&lt;P&gt;More protections will be active in the "Strict" profile.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_7774bc83c8ab29Chris_Atkinson_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Optimized.png" style="width: 761px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19452i7CD0B8EC02AD4193/image-size/large?v=v2&amp;amp;px=999" role="button" title="Optimized.png" alt="Optimized.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Strict.png" style="width: 761px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19453i5439878382E058AB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Strict.png" alt="Strict.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 02:44:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170394#M28355</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-06T02:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170395#M28356</link>
      <description>&lt;P&gt;The screenshot below action is Detect mean that Anti-Virus software blade not protection and allow the connection. Am I right ?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 03:17:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170395#M28356</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-06T03:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170397#M28357</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 758px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19454iF4092FDB1B640911/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;* Update picture for last previous question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 03:19:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170397#M28357</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-06T03:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170398#M28358</link>
      <description>&lt;P&gt;Detect in this context means it was obsevered and not prevented based on the profile settings.&lt;/P&gt;
&lt;P&gt;Please expand one of the line/log entries and we can help explain it better for you.&lt;/P&gt;
&lt;P&gt;(Mask / redact sensitive parts as required).&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 04:54:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170398#M28358</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-06T04:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170404#M28359</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Could you please check the detail log below picture and&amp;nbsp; help explain .&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Anti-Bot-1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19455i8E3427C622FC6389/image-size/large?v=v2&amp;amp;px=999" role="button" title="Anti-Bot-1.png" alt="Anti-Bot-1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 06:54:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170404#M28359</guid>
      <dc:creator>Samphas1</dc:creator>
      <dc:date>2023-02-06T06:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Security Logs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170407#M28360</link>
      <description>&lt;P&gt;Reason is that you enabled background classification mode, see sk74120. But this SK is not found...&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 07:35:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Security-Logs/m-p/170407#M28360</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-02-06T07:35:57Z</dc:date>
    </item>
  </channel>
</rss>

