- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear Team,
I have obeserved in the Generaloverview tab of Smartview of The Management Server that there are Some critical attacks which werenot prevented by Policy.
When went through the logs most of them wre with
Protection name : "DNS Reputation"
Description: Connection was allowed because background classification mode was set. See sk74120 for more information
Action : Detect
When I go through the 74120, as per my understanding if there is no cache information about the resource, as the mode is set to Background and Checkpoint will continue its categorization and connection was allowed.
After the classification was found a detect log was generated.
I want to know was the connection is abnormal and any malicious data was received by endpoint user?
What is mean by Infected hosts in General overview? is the endpoints are infected?
How can I investigate further about these logs?
For reference I have attached the one of the log screenshot.
A DNS query should merely contain the desired FDQN and the IPs they resolve to.
The FDQN requested might leak a small amount of data but isolated instances of this don't necessarily indicate an issue (at least not without other indicators being present).
Regards,
Saranya
Dear Team,
Along with the previous queries,
I have observed that the Source IP in the logs are Firewalls Internal or External IP are replicating.
How the Firewall itself try to access the URL or Destination(Google DNS Server or Internal DNS Server ) ?
Source: Firewalls Internal or External Interface IPs
Destination: Google DNS or Internal DNS Server
My thought on this
Based on the description "Connection was allowed because background classification mode was set. See sk74120 for more information"
The firewall has no information about the URL in its cache, it try to get the information from the Cloud, but here the destination is should be Checkpoint Cloud.
If it is not the case I have configured my TP Engine settings as Hold.
For reference I attached the screenshot of the TE profile and TE Engine Settings.
Please correct me if I am wrong.
Regards,
Saranya
DNS Reputation refers to domains that we've seen significant malicious activity from.
This is different from URL Filtering, which pulls from a different database than Threat Prevention.
However, that is also showing the site as malicious:
A "Detect" means the traffic was ultimately allowed to pass because of your configuration.
Given the amount of data transferred, it seems likely this system has been compromised somehow.
If it were me, if you haven't already done so, I'd be activating my organization's incident response plan.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 12 | |
| 10 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY