- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hi, Mates
I have an MDS environment in combination with VSX.
In some of my VSX Clusters, I have some VS that have AV/AB/IPS enabled.
I have the need to create a point block on some of the VS, for example for the Malware “Malware.TC.8502EJGJ”. The problem is that it does not allow me to do it when I am standing in the “Security Policies -> My Policy Package -> Threat Prevention -> Exceptions” section.
This configuration can only be done by the Global Domain of the MDS?
Can't it be done uniquely in the CMA I need?
I have traffic that is only being “Detected” when the TP profile I have, indicates that it should be “Prevented” but still, the traffic is going through, and I need to block it somehow.
Thanks for your comments.
Hey bro,
Is that option not present when you are logged into CMA's smart console?
Andy
Hey.
The option appears when you connect to the CMA, but you cannot configure anything.
The only way, is that you enter the MDS Global Domain, and from there it allows you to create what you need, but then, it only works in MDS environments with VSX?
Can't you just configure this, being “stopped” in the CMA you need?
Not all my CMAs need to have “Global Exceptions” configuration.
I see, thats the screenshot you posted. Hm...what if you add new exceptions "package" on the top and not use global one? See if that lets you add a new rule.
Andy
You should be able to create a specific rule in the Threat Prevention policy on the CMA that will basically do the same thing.
Hi,
Can I create a rule in Threat Prevention Policy, for a specific malware? For example for "Malware.TC.8502EJGJ" for a single segment of my internal network?
Cheers.
Generally, yes, though not sure on the generic ThreatCloud protections (which this is).
What is the best alternative in scenarios where you need to block multiple domains discovered that have a bad reputation (malicious)?
Is it to use the URLF Blade for these cases? Maybe create a ‘Custom/Applications Site’?
Our AV/AB profile is ‘ignoring’ the blocking of domains that it should be blocking according to our profile (Traffic is being tagged as ‘Detect’)
We want a safe way to generate the blocking of these domains
This can be done only as URLF? Because I don't see the option in AV/AB to block based on Malware type.
You can create a Custom Application/Site object with the relevant domains.
This object can be used in the Threat Prevention policy in addition to the Access Policy.
Hi
The ‘Custom/Applications Site’ can be used without activating the URLF blade?
If I put it in an explicit rule in the TP layer, the GW is able to do the filtering if I only have active blades like AV/AB?
Custom Application/Site Objects require either App Control or URL Filtering to be usable in the Access Policy.
They can also be used in Threat Emulation without activating either of these blades.
From your screenshot it looks like you are trying to configure the wrong 'Global Exceptions' policy.
The one with a 'G' in the icon are read-only and handled from the Global Policy.
Try to click on 'Global Exceptions' (without G in icon) and then try to 'Add exceptions'
From the screenshot, it looks like you are trying to configure the 'Global Exceptions' handled by the Global Policy (G in icon). Thats only possible from the Global Policy.
Try to click on 'Global Exceptions' (without G in icon) and then 'Add Exception'
That sounds very logical, for sure.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 63 | |
| 19 | |
| 13 | |
| 12 | |
| 12 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY