<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTP Inspection with personalized content filter in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192282#M32220</link>
    <description>&lt;P&gt;For Threat Prevention, you have the ability to create &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/SNORT-Signature-Support.htm" target="_self"&gt;Snort Signatures&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Sep 2023 18:07:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-09-11T18:07:56Z</dc:date>
    <item>
      <title>HTTP Inspection with personalized content filter</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192019#M32168</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;we have some Microsoft packets coming form MS ISP IP addresses on HTTPS.&lt;BR /&gt;Those packets are originated by MS services for authentication purposes.&lt;BR /&gt;They are proxied through our firewall and forwarded to our onpremise federated auth infrastructure in dmz.&lt;/P&gt;&lt;P&gt;We receive both legitimate auth requests and brute force attacks.&lt;BR /&gt;The source IP addresses are ever trusted MS IPs and can not be filtered or dropped.&lt;BR /&gt;&lt;BR /&gt;We would know if there is a way to enable https inspection inbound , parsing the content (the IP addreess inside the message) based on a list of IPs that we knows as malicius and we collect in other ways end finally prevent the packet from reaching the auth infrastructure&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Only the checkpoint IPS&amp;nbsp; IPs reputation&amp;nbsp; may be not enough for us&lt;/P&gt;&lt;P&gt;(for now Microsoft says there is no ways for them to block those request......)&lt;/P&gt;&lt;P&gt;Many thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rui&lt;/P&gt;</description>
      <pubDate>Fri, 08 Sep 2023 09:21:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192019#M32168</guid>
      <dc:creator>RuiCosta</dc:creator>
      <dc:date>2023-09-08T09:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP Inspection with personalized content filter</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192090#M32180</link>
      <description>&lt;P&gt;How precisely is the IP encoded in the traffic?&lt;BR /&gt;If it's not in an IP or an HTTP header, it'll probably require an RFE.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Sep 2023 02:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192090#M32180</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-09T02:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP Inspection with personalized content filter</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192154#M32192</link>
      <description>&lt;P&gt;Hi, tks for your answer. Unfortunately inside the body message.&amp;nbsp;&lt;BR /&gt;I suppose that a way must exist maybe in another blade like AV.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 07:36:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192154#M32192</guid>
      <dc:creator>RuiCosta</dc:creator>
      <dc:date>2023-09-11T07:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP Inspection with personalized content filter</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192282#M32220</link>
      <description>&lt;P&gt;For Threat Prevention, you have the ability to create &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_ThreatPrevention_AdminGuide/Topics-TPG/SNORT-Signature-Support.htm" target="_self"&gt;Snort Signatures&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 18:07:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192282#M32220</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-11T18:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: HTTP Inspection with personalized content filter</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192733#M32272</link>
      <description>&lt;P&gt;Hi. Many thanks, I will check this feature (for me) unknown &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;Bye&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 08:10:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HTTP-Inspection-with-personalized-content-filter/m-p/192733#M32272</guid>
      <dc:creator>RuiCosta</dc:creator>
      <dc:date>2023-09-15T08:10:55Z</dc:date>
    </item>
  </channel>
</rss>

