<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dropping intruders specific active connection in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21706#M4051</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is not the purpose of threat extraction to be honest , you can achieve that with the antibot blade but this is post infection , threat extraction extract active code execution or similar from a file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Jan 2018 11:29:36 GMT</pubDate>
    <dc:creator>Marco_Valenti</dc:creator>
    <dc:date>2018-01-09T11:29:36Z</dc:date>
    <item>
      <title>Dropping intruders specific active connection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21705#M4050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Can someone confirm if SandBlast Threat Extraction can help dropping attacker's specific active connection? or we need to create a SAM rulebase by looking at active log connection that we want to block&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2018 05:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21705#M4050</guid>
      <dc:creator>Masood_ahmad</dc:creator>
      <dc:date>2018-01-09T05:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Dropping intruders specific active connection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21706#M4051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it is not the purpose of threat extraction to be honest , you can achieve that with the antibot blade but this is post infection , threat extraction extract active code execution or similar from a file&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2018 11:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21706#M4051</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-01-09T11:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Dropping intruders specific active connection</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21707#M4052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to block a specific active connection, you need to use SAM or fw samp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jan 2018 03:09:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Dropping-intruders-specific-active-connection/m-p/21707#M4052</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-15T03:09:46Z</dc:date>
    </item>
  </channel>
</rss>

