<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Signature causes False Positives on Threat Cloud in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226781#M37877</link>
    <description>&lt;P&gt;Not that uncommon of an event lately unfortunately.. I can count 3 instances at least where we had unexplained bulk false-positive events with customers; the first one as of late was right around New Years.&lt;/P&gt;&lt;P&gt;I can't help but vent my frustration regarding this, especially after the statement made regarding the Crowdstrike related event and the claims of extensive testing performed.&lt;/P&gt;&lt;P&gt;It's not that particularly obscure applications are being detected; SSL Network Extender (a Check Point application if I remember correctly) was cleaned up on my system. I would like to guess that this software at least would be present on internal systems.&lt;/P&gt;&lt;P&gt;Not having a big red "revert" button is also somewhat strange; I don't think a tool as powerful and influential as Threat Cloud should involve hours of revert operations for this type of change.&lt;/P&gt;&lt;P&gt;What's even worse is not having a central way to purge local cache on Endpoints and dealing with "suggestions" along the lines of "it'll clear up in a few days"; it's not a skin rash, it's a potentially company crippling event.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Sep 2024 13:00:44 GMT</pubDate>
    <dc:creator>Swiftyyyyy</dc:creator>
    <dc:date>2024-09-16T13:00:44Z</dc:date>
    <item>
      <title>New Signature causes False Positives on Threat Cloud</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226767#M37874</link>
      <description>&lt;H3&gt;Attention:&amp;nbsp;New Signature causes False Positives on Threat Cloud, potentially impacting the products that use Threat Emulation and Anti Virus Blades&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;UPDATE 17.09.2024&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The fix propagated world-wide, and the issue was resolved but we are working with our customers to restore the quarantine files and emails.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please refer to &lt;A href="https://support.checkpoint.com/results/sk/sk182688" target="_self"&gt;sk182688 for details&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;-------&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ORIGINALLY posted on 16.09.2024&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Hi all, we want to inform you that there is an issue with a new signature that was uploaded to the Threat Cloud service that might cause False Positives, this potentially affects the products that use Threat Emulation and Anti Virus Blades. The issue is mostly limited to false positive alerts and file quarantine events with the Harmony Endpoint.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Check Point R&amp;amp;D teams already identified the root cause and deployed a fixed signature to Threat Cloud Service, the fix will propagate worldwide in the next few hours.&lt;BR /&gt;&lt;BR /&gt;We are currently working on a SK that will be published shortly.&lt;BR /&gt;&lt;BR /&gt;You can also follow up on the incident via its &lt;A href="https://status.checkpoint.com/incidents/cfns8zwtg6kd" target="_self"&gt;status page&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 07:09:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226767#M37874</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-17T07:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: New Signature causes False Positives on Threat Cloud</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226781#M37877</link>
      <description>&lt;P&gt;Not that uncommon of an event lately unfortunately.. I can count 3 instances at least where we had unexplained bulk false-positive events with customers; the first one as of late was right around New Years.&lt;/P&gt;&lt;P&gt;I can't help but vent my frustration regarding this, especially after the statement made regarding the Crowdstrike related event and the claims of extensive testing performed.&lt;/P&gt;&lt;P&gt;It's not that particularly obscure applications are being detected; SSL Network Extender (a Check Point application if I remember correctly) was cleaned up on my system. I would like to guess that this software at least would be present on internal systems.&lt;/P&gt;&lt;P&gt;Not having a big red "revert" button is also somewhat strange; I don't think a tool as powerful and influential as Threat Cloud should involve hours of revert operations for this type of change.&lt;/P&gt;&lt;P&gt;What's even worse is not having a central way to purge local cache on Endpoints and dealing with "suggestions" along the lines of "it'll clear up in a few days"; it's not a skin rash, it's a potentially company crippling event.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 13:00:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226781#M37877</guid>
      <dc:creator>Swiftyyyyy</dc:creator>
      <dc:date>2024-09-16T13:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: New Signature causes False Positives on Threat Cloud</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226881#M37898</link>
      <description>&lt;P&gt;&lt;SPAN&gt;The fix propagated world-wide, and the issue was resolved but we are working with our customers to restore the quarantine files and emails.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please refer to &lt;A href="https://support.checkpoint.com/results/sk/sk182688" target="_self"&gt;sk182688 for details&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 07:09:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226881#M37898</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-17T07:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: New Signature causes False Positives on Threat Cloud</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226892#M37900</link>
      <description>&lt;P&gt;We're seeing a lot of clients reporting they are unable to update the Anti-Malware Database component since this morning, other components are OK.&lt;/P&gt;
&lt;P&gt;Sometimes repeating the manual refresh works but not always. Is this related to this issue?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Sep 2024 09:20:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-Signature-causes-False-Positives-on-Threat-Cloud/m-p/226892#M37900</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-09-17T09:20:37Z</dc:date>
    </item>
  </channel>
</rss>

