- CheckMates
- :
- Products
- :
- Quantum
- :
- Management
- :
- Re: Checkpoint blocking the landing page of Micros...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Checkpoint blocking the landing page of Microsoft
Hello Team,
Environment
2 Check Point 5900 VSX environment running R80.40 JHF 192
Management console is running on R81.10 JHF109
Issue
Need you suggestion on this issue we are facing in our environment.
We're currently running into issues while testing out AST as our new phishing simulation tool, part of the MS Defender platform.
Check Point is blocking the landing page attemplate.com as potentially malicious/spyware website.
This is the global landing page for the service, as acknowledged by MS here https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulation-train...
This URL is recently changed by Microsoft, as some tests done few weeks ago were not blocked by the firewall.
Phishing simulations are only successful if the different security elements are not blocking the simulation
The issue started some weeks ago – during initial testing of the phishing simulation, the issue did not occur. Now we see that the Application/URL filtering is blocking the access to one of the Microsoft phishing domain names and IPS flags also mark the DNS request as phishing.
See screenshots below: attempts have been made to access https://attemplate.com (see list of domains in Get started using Attack simulation training | Microsoft Learn). Microsoft is updating the list of domains used for Attack simulation training often as seen below
As Microsoft is dynamically updating the different landing page templates, is there a possibility to dynamically exclude these 'landing pages' on the Check Point environment?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Team,
Any update on above query ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
These URLs will need exclusions in your Threat Prevention policy.
Having them as a form of dynamic / updatable object would be an RFE that you should consult your local SE about.
Microsoft publish other lists in a JSON format for easy consumption but this doesn't appear to be the case here.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Can you temporarily just not add *microsoft* to access these sites? As per below in my screenshots/
Andy
