- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi,
We have a scenario where files that have MS excel macros are needed for day to day running of the business.
We are using Harmony Endpoint Client on all our machines, the files that we download are from legitimate sites that are familiar with, would like to exempt them from both Browse protection and Emulation, these two protections identify the legitimate files as malicious.
How can we exempt using the source as the domain?
I will check tomorrow for you, but though I dont do much endpoint myself, I believe this can be done in the policy.
Best,
Andy
Thank you for this. Will follow the steps and give feedback.
As promised, this is it. But, what Phoneboy sent appears to be the right sk.
Best,
Andy
Thank you for getting back to me. I will try the solution and give feedback.
Did you make an exceptions as we discussed?
Andy
If that did not work, I would see if you can do remote with TAC, not sure what else could be missing.
Best,
Andy
Will open case later in the day.
Thank you for your time.
Sounds like a plan. Keep us posted how it gets solved.
Best,
Andy
Hey,
According to the screenshot, you've excluded it from web downloads but not from other blades.
I would also suggest to move to smart exclusions where creating exclusions provides many more capabilities and is also more user friendly. If you want to join the EA provide me with your tenant ID via a private msg or alternatively reach out to us via the feedback button in the portal.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY