<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy Settings for Wi-Fi Networks in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/Policy-Settings-for-Wi-Fi-Networks/m-p/39559#M203</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Policy Settings for Wi-Fi networks has been expanded to allow administrators to set the risk level for different kinds of man-in-the-middle attacks and to add additional external URLs used to detect man-in-the-middle attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These settings can be configured by navigating to &lt;STRONG&gt;Settings &amp;gt; Policy Settings &amp;gt; WiFi Network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Changing the Risk Level for the types of man-in-the-middle attacks&lt;/H2&gt;&lt;P&gt;The administrator can change the risk level for SSL Stripping, SSL Interception (Basic), and SSL Interception (Advanced) to one of the following levels:&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;High (Device Alert) - default&lt;/LI&gt;&lt;LI&gt;Medium (Device Alert)&lt;/LI&gt;&lt;LI&gt;Medium (No Device Alert)&lt;/LI&gt;&lt;LI&gt;Medium (Dismissive Device Alert)&lt;/LI&gt;&lt;LI&gt;Low&lt;/LI&gt;&lt;LI&gt;No Risk&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="63525" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63525_pastedImage_1.png" style="width: 620px; height: 375px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;Definitions&lt;/H3&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH&gt;Term&lt;/TH&gt;&lt;TH&gt;Definition&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Stripping&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts all network traffic redirection from HTTP to HTTPS and "strips" the HTTPS call leaving the traffic as HTTP.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Interception (Basic)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts HTTPS traffic by using an invalid certificate that does not exist on the device's trusted certificates or not trusted by a root CA.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Interception (Advanced)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts HTTPS traffic by using a valid certificate that does not match the certificate of the server.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Configuring additional external URLs for man-in-the-middle detection&lt;/H2&gt;&lt;P&gt;Man-in-the-middle attacks are detected by making https function calls from the device to a honeypot. In case an attacker managed to drop or intercept the connection to the known honeypot, the man-in-the-middle detection will fail to detect the attack. Allowing the administrator to enter additional external URLs to the inspection list, the man-in-the-middle detection is extended to check more websites, making it harder for attackers to circumvent the man-in-the-middle detection.&lt;/P&gt;&lt;P&gt;Adding websites used by your organization for day-to-day business is recommended.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63526" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63526_pastedImage_8.png" style="width: 620px; height: 377px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Mar 2018 23:37:23 GMT</pubDate>
    <dc:creator>Pamela_S__Lee</dc:creator>
    <dc:date>2018-03-07T23:37:23Z</dc:date>
    <item>
      <title>Policy Settings for Wi-Fi Networks</title>
      <link>https://community.checkpoint.com/t5/Mobile/Policy-Settings-for-Wi-Fi-Networks/m-p/39559#M203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Policy Settings for Wi-Fi networks has been expanded to allow administrators to set the risk level for different kinds of man-in-the-middle attacks and to add additional external URLs used to detect man-in-the-middle attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These settings can be configured by navigating to &lt;STRONG&gt;Settings &amp;gt; Policy Settings &amp;gt; WiFi Network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Changing the Risk Level for the types of man-in-the-middle attacks&lt;/H2&gt;&lt;P&gt;The administrator can change the risk level for SSL Stripping, SSL Interception (Basic), and SSL Interception (Advanced) to one of the following levels:&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;High (Device Alert) - default&lt;/LI&gt;&lt;LI&gt;Medium (Device Alert)&lt;/LI&gt;&lt;LI&gt;Medium (No Device Alert)&lt;/LI&gt;&lt;LI&gt;Medium (Dismissive Device Alert)&lt;/LI&gt;&lt;LI&gt;Low&lt;/LI&gt;&lt;LI&gt;No Risk&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;IMG __jive_id="63525" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63525_pastedImage_1.png" style="width: 620px; height: 375px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;Definitions&lt;/H3&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH&gt;Term&lt;/TH&gt;&lt;TH&gt;Definition&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Stripping&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts all network traffic redirection from HTTP to HTTPS and "strips" the HTTPS call leaving the traffic as HTTP.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Interception (Basic)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts HTTPS traffic by using an invalid certificate that does not exist on the device's trusted certificates or not trusted by a root CA.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;SSL Interception (Advanced)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;MitM attack that intercepts HTTPS traffic by using a valid certificate that does not match the certificate of the server.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;Configuring additional external URLs for man-in-the-middle detection&lt;/H2&gt;&lt;P&gt;Man-in-the-middle attacks are detected by making https function calls from the device to a honeypot. In case an attacker managed to drop or intercept the connection to the known honeypot, the man-in-the-middle detection will fail to detect the attack. Allowing the administrator to enter additional external URLs to the inspection list, the man-in-the-middle detection is extended to check more websites, making it harder for attackers to circumvent the man-in-the-middle detection.&lt;/P&gt;&lt;P&gt;Adding websites used by your organization for day-to-day business is recommended.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63526" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63526_pastedImage_8.png" style="width: 620px; height: 377px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2018 23:37:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/Policy-Settings-for-Wi-Fi-Networks/m-p/39559#M203</guid>
      <dc:creator>Pamela_S__Lee</dc:creator>
      <dc:date>2018-03-07T23:37:23Z</dc:date>
    </item>
  </channel>
</rss>

