<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: prevent access policy change in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106666#M4601</link>
    <description>&lt;P&gt;Admin is supposed to be able to change policy. But you may create account with "view only" permissions.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Dec 2020 16:08:54 GMT</pubDate>
    <dc:creator>HristoGrigorov</dc:creator>
    <dc:date>2020-12-30T16:08:54Z</dc:date>
    <item>
      <title>prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106619#M4598</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I am looking for some option to prevent local admin to create rules "on top" of SMP auto -generated rules.&lt;BR /&gt;Even if the firewall access policy and URL/App filtering policy configured "manage in SMP" -local admin can still add manual rule with "any-any accept"&amp;nbsp; on topof those rules&amp;nbsp; .&lt;BR /&gt;In this case all block rule for "undesired applications " are ineffective.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;BR /&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 08:45:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106619#M4598</guid>
      <dc:creator>Leonid_German</dc:creator>
      <dc:date>2020-12-30T08:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106666#M4601</link>
      <description>&lt;P&gt;Admin is supposed to be able to change policy. But you may create account with "view only" permissions.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 16:08:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106666#M4601</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-12-30T16:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106667#M4602</link>
      <description>&lt;P&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118035" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118035&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Note this requires recent firmware and is NOT currently supported on the 1500 series appliances.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 16:13:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106667#M4602</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-30T16:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106669#M4603</link>
      <description>&lt;P&gt;So to be clear, you want to have rules which the device administrator cannot opt out of?&lt;/P&gt;
&lt;P&gt;That's what Provider-1's global policies do. You have a "Before" section and an "After" section at the global level. These rules are imposed on the CMAs. Admins at the CMA level cannot make any rules above the "Before" rules from the global policy.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 16:21:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106669#M4603</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2020-12-30T16:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106671#M4604</link>
      <description>&lt;P&gt;It's also the kind of functionality SMP supports, just not with 1500 gateways (yet, presumably).&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 16:50:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106671#M4604</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-30T16:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106692#M4605</link>
      <description>&lt;P&gt;And the 1500s can be managed by a SmartCenter, so Provider-1 would work now.&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;As an aside, does GAiA Embedded have Sofaware bits? I don't think I knew SMP could manage them. Or that SMP was still around, really.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 21:28:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106692#M4605</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2020-12-30T21:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106694#M4606</link>
      <description>&lt;P data-unlink="true"&gt;Right, but the question was about SMP.&lt;BR /&gt;In the Sofaware days, SMP was both a cloud-based and an on-premise management solution for Safe@/UTM-1&amp;nbsp;&amp;nbsp;EDGE appliances.&lt;BR /&gt;It has since been expanded to manage Embedded Gaia appliances, but we no longer offer it as an on-premise solution.&lt;/P&gt;
&lt;P data-unlink="true"&gt;Now, as to whether there are Sofaware bits in Embedded Gaia, I'd say: highly likely.&lt;BR /&gt;We did fully acquire Sofaware, after all. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Dec 2020 21:53:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106694#M4606</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-30T21:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: prevent access policy change</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106705#M4607</link>
      <description>&lt;P&gt;Thank you all!&lt;BR /&gt;It seems like only Privider-1 management can support full pre and post rules.&lt;BR /&gt;SMP portal pre rules are not include applications/url restrictions .&lt;BR /&gt;I hope in the future Checkpoint will support pre rules with application control on SMP management.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 08:35:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/prevent-access-policy-change/m-p/106705#M4607</guid>
      <dc:creator>Leonid_German</dc:creator>
      <dc:date>2020-12-31T08:35:24Z</dc:date>
    </item>
  </channel>
</rss>

