- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hello Checkmates,
Can you help me understand the value "bypass" under column M "Action details" in the Anti-virus blade Log. And why the traffic was allowed although the rule was to prevent?
The Threat Prevention rule of the Anti-Virus and Anti-Bot rule for "Confidence Level = High" and "severity = High" is to prevent but the traffic was allowed with action "Detect".
Time | Type | Action | Resource | Protection Name | Destination | Confidence Level | Severity | Blade | Protection Type | Malware Action | Correlation Unit Category | Action Details |
May 4, 2020 2:36:25 PM | Correlated | Detect | http://googe[.]com/ | Phishing_website.TC.xyuns | 162.243.10.151 | High | High | Anti-Virus | URL Reputation | Access to site known to contain malware | Legacy;Threat Prevention | bypass |
May 4, 2020 2:36:24 PM | Log | Detect | http://googe[.]com/ | Phishing_website.TC.xyuns | 162.243.10.151 | High | High | Anti-Virus | URL Reputation | Access to site known to contain malware | bypass |
Is the gateway set to Hold or Background?
I could see that happening if set to Background, where there may be a delay before the gateway receives the exact classification and the connection was short (and thus couldn't be prevented in time).
Spot on! - it is set to Background.
What are the pros and cons of setting it to Hold. What is the average delay of a hold?
Thanks
FM
I read the general description of the three different options, but what i am looking for is an expert's insight about setting the Resource categorization mode to "Hold" -- is the latency noticeable to the end user?
Thank you
FM
We finally changed the setting to HOLD on 2020-07-23 but it allowed 3 in Detect in stead of Prevent. See attached screen capture showing the resource Categorization setting as "Hold"; and a table showing the allowed traffic in Background mode. The traffic fulfill the conditions for the traffic to "Prevented"--Confidence level = "High" and Severity "High" or "Critical". Can you tell me why the vendor list value for one of the events is blank?
Time | Malware Action | Vendor List | Description |
Jul 29, 2020 2:04:34 PM | Malicious file/exploit download | ||
Jul 29, 2020 2:04:31 PM | Malicious file/exploit download | Check Point ThreatCloud | Connection was allowed because background classification mode was set. See sk74120 for more information. |
Jul 29, 2020 12:43:28 PM | Malicious file/exploit download | Check Point ThreatCloud | Connection was allowed because background classification mode was set. See sk74120 for more information. |
Did you push policy after making that change?
If so, you may want to involve the TAC.
I am waiting for the Network admin to confirm if he did "Push Policy".
If it has the same effect? we did "Push Policy" after our weekly IDS protection rule update on Wed 7/29/2020 6:10 PM-- the time of the push policy was after the 3 events that were allowed at Jul 29, 2020 2:04:34 PM and could not have applied.
Pretty sure changing the profile requires an explicit policy push versus the automatic update of IPS signatures, which doesn't require an explicit policy push to take effect.
A side question for you, perhaps you can help.
Some traffic on Anti-bot blade I am monitoring is currently allowing traffic through as Detect and not Prevent even though the gateway is set to 'Hold' and not 'Background'. The Threat Prevention policy is also set to Prevent. I found no exceptions that could interfere with this. On R80.30 btw
Need to see the redacted log card for this event to assist. In the meantime, check the Activations tab for all the circled Protection classes below:
Pretty sure DNS Reputation is part of "Reputation Domains" or possibly "Reputation IPs". And the Activations for these two categories are set to what for your TP profiles?
Both categories are set to Prevent.
I did find another source that says that DNS Reputation will always be set to Detect and this config can't be changed.
Perhaps this is the cause?
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY