<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Customer FTP traffic keeps triggering new IPS protections in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256200#M43128</link>
    <description>&lt;P&gt;Nice to see some people are still using FTP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can actually create a new Threat Prevention profile where Medium Confidence protections are set to Detect:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31332i9667A971574DDCBA/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Whether you should or not is a separate question.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Aug 2025 13:15:07 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-08-29T13:15:07Z</dc:date>
    <item>
      <title>Customer FTP traffic keeps triggering new IPS protections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256192#M43126</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We have an issue where a customers FTP traffic (using port range TCP/30200-30220) keeps triggering new IPS protections. So far we have been reactively adding exceptions for each occurrence, but obviously this is not really a sustainable solution. Some of the protections so far triggered are listed below. I notice all of them are Medium confidence, and I did open a TAC case a year or so ago for a similar issue, and they did advise that low/medium confidence protections are susceptible to false positives, and changing them to detect is essentially the best solution. But I worry this creates some security gaps as obviously real occurrences of the attacks can happen and could be missed.&lt;/P&gt;&lt;P&gt;Could you guys advise how you handle these types of protections, is changing low/medium protections to detect a best practice? The only other thing I can think is to try and grab all of the IP's from our customers systems, and build some wider exception with them, so that all medium protections detect instead of prevent (I am not sure this is possible?)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE width="810"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;&lt;STRONG&gt;IPS protection:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;&lt;STRONG&gt;# of incidents&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;&lt;STRONG&gt;Confidence Level&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;&lt;STRONG&gt;Severity&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;&lt;STRONG&gt;Performance Impact&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;Internet Explorer FTP Response Parsing Memory Corruption&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;3&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;Malicious Payload Encoding Remote Code Execution&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;2&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;Tripwire Format String (CVE-2004-0536)&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;Low&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;VMware Multiple Products NAT Service Buffer Overflow&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="376"&gt;&lt;P&gt;Multiple SSH Initial Connection Requests&lt;/P&gt;&lt;/TD&gt;&lt;TD width="125"&gt;&lt;P&gt;1&lt;/P&gt;&lt;/TD&gt;&lt;TD width="142"&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;TD width="32"&gt;&lt;P&gt;High&lt;/P&gt;&lt;/TD&gt;&lt;TD width="136"&gt;&lt;P&gt;Low&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, I appreciate any feedback!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 12:17:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256192#M43126</guid>
      <dc:creator>Parabol</dc:creator>
      <dc:date>2025-08-29T12:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: Customer FTP traffic keeps triggering new IPS protections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256200#M43128</link>
      <description>&lt;P&gt;Nice to see some people are still using FTP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;You can actually create a new Threat Prevention profile where Medium Confidence protections are set to Detect:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31332i9667A971574DDCBA/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Whether you should or not is a separate question.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 13:15:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256200#M43128</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-08-29T13:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: Customer FTP traffic keeps triggering new IPS protections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256201#M43129</link>
      <description>&lt;P&gt;My suggestion...do NOT use ftp &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 29 Aug 2025 13:16:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Customer-FTP-traffic-keeps-triggering-new-IPS-protections/m-p/256201#M43129</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-08-29T13:16:48Z</dc:date>
    </item>
  </channel>
</rss>

