<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Password Keepers in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238869#M39898</link>
    <description>&lt;P&gt;Do you have any log example you can attach? If yes, just blur out any sentisive data.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2025 23:13:05 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-01-16T23:13:05Z</dc:date>
    <item>
      <title>Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238860#M39895</link>
      <description>&lt;P&gt;The firewall is indicating that users are taking advantage of 1Password and Lastpass in the form of a browser plugin. How do I see if they are using them on personal sites or company urls. I want to prove if they are saving company passwords to personal password managers.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 21:12:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238860#M39895</guid>
      <dc:creator>Agent_Smith</dc:creator>
      <dc:date>2025-01-16T21:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238862#M39896</link>
      <description>&lt;P&gt;Not aware of a way to prove this from the network side of things.&amp;nbsp;&lt;BR /&gt;Having said that, controlling the browser plugins used by end users is something organizations typically do (e.g. allow only specific approved ones).&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 21:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238862#M39896</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-16T21:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238869#M39898</link>
      <description>&lt;P&gt;Do you have any log example you can attach? If yes, just blur out any sentisive data.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 23:13:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238869#M39898</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-16T23:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238897#M39902</link>
      <description>&lt;P&gt;You cannot see this with a firewall. It would require HTTPS inspection and all the plain data to be readable for you. Then somehow collect this data what is inside this extension.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From my point of view you should either block these types of extensions (can be done via GPO) or allow them. I would allow them and provide a tool managed by the company. Reason for that is, if a user is not allowed to use a password management tool the user will most likely write down the passwords on a piece of paper or put it in a plain text file on the desktop. Also it will force the user to use more easy passwords and reuse old passwords (just change 1 number and add up every reset). Last reason is that with a password tool a user is more likely to use a different password for different websites. Instead of 1 easy to remember password for all websites.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 10:36:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238897#M39902</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-17T10:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238909#M39904</link>
      <description>&lt;P&gt;I was thinking maybe QUIC protocol, but probably not. Cant recall now if there are any browser logins that could be blocked via ssl inspection policy, but will check in the lab later.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 12:05:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238909#M39904</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T12:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238910#M39905</link>
      <description>&lt;P&gt;I think this is actually really good response from AI copilot, but it involves harmony endpoint.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;**************************&lt;/P&gt;
&lt;DIV class="ai-chatbot-conversation-assistant-text css-1lxqfct"&gt;
&lt;P&gt;To monitor and prevent the use of corporate passwords on personal sites, you can use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Password Reuse Protection&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;feature in Harmony Endpoint. This feature alerts users and logs incidents when corporate passwords are used on non-corporate domains. Here’s how you can set it up:&lt;/P&gt;
&lt;H3&gt;Steps to Configure Password Reuse Protection&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Access the Policy Settings:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Go to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Threat Prevention&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy Capabilities&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Select the Rule:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Select the rule set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Navigate to Web &amp;amp; Files Protection:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Capabilities &amp;amp; Exclusions&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;pane, select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Web &amp;amp; Files Protection&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Configure Credential Protection:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Web &amp;amp; Files Protection&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tab, scroll down to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Credential Protection&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Password Reuse&lt;/STRONG&gt;, select a mode:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Prevent mode&lt;/STRONG&gt;: Blocks the user from entering the corporate password and opens the blocking page in a new tab. If you enable&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Allow users to dismiss the password reuse alert and access the website&lt;/STRONG&gt;, then it allows the user to dismiss the blocking page and continue to enter the corporate password.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Detect mode&lt;/STRONG&gt;: The system does not block the user from entering the corporate password. If a user enters the corporate password, it is captured in the Harmony Browse logs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Off&lt;/STRONG&gt;: Turns off password reuse protection.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3&gt;Example Configuration&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-plaintext"&gt;Prevent mode - Blocks the user from entering the corporate password and opens the blocking page in a new tab. If you enable Allow users to dismiss the password reuse alert and access the website, then it allows the user to dismiss the blocking page and continue to enter the corporate password.
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;Notes:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Detect mode&lt;/STRONG&gt;: The system does not block the user from entering the corporate password. If a user enters the corporate password, it is captured in the Harmony Browse logs.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Off&lt;/STRONG&gt;: Turns off password reuse protection.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Additional Information:&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;This feature is not supported with Safari and Internet Explorer browser extensions.&lt;/LI&gt;
&lt;LI&gt;Ensure that the browser extension is installed and configured correctly for Chrome or Edge browsers.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;By enabling and configuring the Password Reuse Protection feature, you can monitor and log incidents where corporate passwords are used on personal sites, helping you to prove if users are saving company passwords to personal password managers like 1Password and LastPass.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_HarmonyEndpointWebManagement_AdminGuide/Topics-Common-for-HEP-HB/Client_User_Interface_Settings.htm" target="_blank" rel="noopener"&gt;R81.10 Harmony Endpoint Web Management Administration Guide (English) - Client_User_Interface_Settings&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-Common-for-HEP-HB/Client_User_Interface_Settings.htm" target="_blank" rel="noopener"&gt;Harmony Endpoint Administration Guide (English) - Client_User_Interface_Settings&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_HarmonyEndpointWebManagement_AdminGuide/Content/Topics-Common-for-HEP-HB/Client_User_Interface_Settings.htm" target="_blank" rel="noopener"&gt;R81.20 Harmony Endpoint Web Management Administration Guide - Client_User_Interface_Settings&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R80.40/SmartEndpoint_OLH/EN/Topics-EPSG/Phishing.html" target="_blank" rel="noopener"&gt;R80.40 Endpoint Security Administration Guide - Phishing&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R81/SmartEndpoint_OLH/EN/Topics-EPSG-R81/Phishing.html" target="_blank" rel="noopener"&gt;R81 Harmony Endpoint Server Administration Guide - Phishing&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R82/SmartEndpoint_OLH/EN/Content/Topics-EPSG-R81.20/Phishing.html" target="_blank" rel="noopener"&gt;R82 Harmony Endpoint Server Administration Guide - Phishing&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/Infinity_Portal/WebAdminGuides/EN/Harmony-Endpoint-Admin-Guide/Topics-HEP/Web-and-Files-Protection.htm" target="_blank" rel="noopener"&gt;Harmony Endpoint Administration Guide (English) - Web-and-Files-Protection&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_HarmonyEndpointWebManagement_AdminGuide/Content/Topics-HEPWM-R81.20/Web-and-Files-Protection.htm" target="_blank" rel="noopener"&gt;R82 Harmony Endpoint Web Management Administration Guide - Web-and-Files-Protection&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R77/CP_R77_IdentityAwareness_WebAdminGuide//62007.htm" target="_blank" rel="noopener"&gt;R77 Identity Awareness Administration Guide - 62007&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 17 Jan 2025 12:14:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238910#M39905</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T12:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238940#M39915</link>
      <description>&lt;P&gt;That doesn't really tell you if you're using a password manager (the original ask), though it will tell you if you're internal credentials on an external site.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:23:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238940#M39915</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-17T15:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238942#M39916</link>
      <description>&lt;P&gt;Ah, got it, makes sense.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:31:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238942#M39916</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T15:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238946#M39919</link>
      <description>&lt;P&gt;Yes what I want to do is see which sites they are using the password keeper for. If its Facebook I don't care. If its the AWS, Azure, intranet other corporate sites I do care as these password keepers are not company sanctioned and personal. Which means they are saving company passwords to a personal site. I am sure the firewall can see the URLs accessed but how to associate the password keeper usage. We do run HTTPS inspection.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:56:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238946#M39919</guid>
      <dc:creator>Agent_Smith</dc:creator>
      <dc:date>2025-01-17T15:56:59Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238948#M39920</link>
      <description>&lt;P&gt;I see what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;was saying about the answer I pasted from Copilot AI, it most likely would not be useful in your case, since it wont say if they are using pass manager or not, just if say company creds might be on external site. This is really interesting/logical ask. Personally, I would also open TAC case and reference this link, so they can see what was already discussed. I sometimes do that when opening a case, it definitely helps.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238948#M39920</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T16:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238950#M39921</link>
      <description>&lt;P&gt;Your question assumes that the password manager is "queried" over the network each time it is used for a specific site.&lt;BR /&gt;Pretty sure none of the password managers operate on that premise.&lt;/P&gt;
&lt;P&gt;The only possible way you can see what sites a password manager is using is on the browser itself.&lt;BR /&gt;That assumes the password manager is a plugin and not, say, an external application the user copy/pastes the password from.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:22:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238950#M39921</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-17T16:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238952#M39922</link>
      <description>&lt;P&gt;Would maybe adding below to the right rule for urlf/appc layer help or you dont think so?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29256i2B73476F02BBAD25/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:25:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238952#M39922</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T16:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238955#M39923</link>
      <description>&lt;P&gt;That might be useful in blocking access to ALL browser plugins.&lt;BR /&gt;Best way to do that is to use the Enterprise management features of the browser, which can restrict what plugins users are allowed to use.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:30:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238955#M39923</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-17T16:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238969#M39925</link>
      <description>&lt;P&gt;This is what I'm seeing in the logs. I don't know for sure its a browser plugin but one says.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 18:21:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238969#M39925</guid>
      <dc:creator>Agent_Smith</dc:creator>
      <dc:date>2025-01-17T18:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238970#M39926</link>
      <description>&lt;P&gt;I was hoping that may give us more info, but does not look like it : - (&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 18:25:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238970#M39926</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-01-17T18:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: Password Keepers</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238983#M39929</link>
      <description>&lt;P&gt;You will not get more info then this from a firewall. There is not a way to know what passwords are in the plugin/tool (from fw point of view)&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jan 2025 12:29:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Password-Keepers/m-p/238983#M39929</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-01-18T12:29:10Z</dc:date>
    </item>
  </channel>
</rss>

