Hello Check Point Community,
Thank you @PhoneBoy Sir.
I recently encountered an issue with the installation of the Check Point Threat Prevention Policy and wanted to share the steps taken to resolve it. This might help others facing similar issues.
Issue: The Threat Prevention Policy installation failed due to incorrect formatting and unsupported types in our Custom Intelligence Feeds CSV file.
Solution: Through thorough review and correction, we successfully resolved the issue. Below are the detailed steps and technical explanations.
Step 1: Identify the Correct Order of Columns:
Correct Order:
Based on the Check Point R81.20 Threat Prevention Administration Guide, the CSV file must follow this column order:
- UNIQ-NAME
- VALUE
- TYPE
- CONFIDENCE
- SEVERITY
- PRODUCT
- COMMENT
Step 2: Supported Indicators and Types:
Supported Formats for Indicators:
- URL
- Domain
- IP
- IP Range
- MD5
- Mail-subject
- Mail-from
- Mail-to
- Mail-cc
- Mail-reply-to
- SHA1 (in Security Gateway versions R80.40 and higher)
- SHA256 (in Security Gateway versions R80.40 and higher)
Supported Types: (In my Issue)
Unsupported Types: (In my Issue)
Step 3: Review and Correct CSV File:
Corrections Made:
- Ensured the columns followed the correct order.
- Removed unsupported types (e.g., HASH and Mutex).
- Verified that all indicators use supported types and formats.
Corrected Format:
UNIQ-NAME |
VALUE |
TYPE |
CONFIDENCE |
SEVERITY |
PRODUCT |
COMMENT |
observ1 |
https://file.io/M9ofMokBC1TN |
URL |
High |
High |
AV |
Malicious URL |
observ2 |
http://117.253.14.152:57028/Mozi.a |
URL |
High |
High |
AV |
Malicious URL |
observ3 |
866a9452ac62e73773c09a1e0209142a |
MD5 |
high |
high |
AV |
Malicious Hash |
observ4 |
4d50315e3841aeee6bb05f7529489939 |
MD5 |
high |
high |
AV |
Malicious Hash |
observ5 |
8f609f60dd82dc13878b1d82ebc56e5056cb9274234df1510ee737e62ba22aaa |
SHA256 |
high |
high |
AV |
Malicious Hash |
observ6 |
90f7d3f354a1637d7467962fe87449532881d06ed76acaae696cc286cba02de7 |
SHA256 |
high |
high |
AV |
Malicious Hash |
observ7 |
5186eb42f2d1a652f9fee0cdf3788b492582aca0 |
SHA1 |
high |
high |
AV |
Malicious Hash |
observ8 |
2faff8718f8f0ee4dcd0be5eb987b77e47961742 |
SHA1 |
high |
high |
AV |
Malicious Hash |
Step 4: Import Corrected CSV File:
After making the necessary corrections, we imported the CSV file into the Check Point Threat Prevention system. The policy installation was successful without any errors.
Conclusion:
Ensuring the CSV file is formatted correctly and only includes supported indicator types is crucial for the successful installation of the Check Point Threat Prevention Policy. This process has strengthened our security posture and streamlined our threat prevention measures.
Regards
@Chinmaya_Naik