Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Steven_Lucas
Participant
Jump to solution

DNS Reputation Exception

I am trying to white-list a single domain for DNS Reputation prevents. Currently, it seems like the only option is to make exceptions for all of our DNS servers, effectively turning off DNS Reputation checks for DNS lookups in our company. 

The domain is a employee awareness training like for phishing that is publically available, so it technically is a phishing site and should not necessary be re-categorized, but we'd like to whitelist it for our company during our phishing tests.

Has anyone ever had to do this before? 

1 Solution

Accepted Solutions
PhoneBoy
Admin
Admin

According to TAC case I've seen, it should be supported to use a Custom Application/Sites.
Here are the steps I found from one TAC case where the customer confirmed it works.

For Anti-Virus Configuration (R81.10, R81.20)

1. Verify Anti-Virus Blade: Ensure that the Anti-Virus blade is enabled.
2. Create Custom Application/Site:

* In SmartConsole, navigate to New > More > Custom Application/Site > Application/Site.
* Name the Application/Site and insert the domains into the URL list.
* Ensure the checkbox for "URLs are defined as Regular Expression" is unchecked.

1. Add Exception:

* Go to Security Policies > Threat Prevention > Exceptions.
* Click on Global Exceptions, then Add Exception > Above to create a new rule.
* Change the Action to Inactive.
* In the Protection/Site/File/Blade section, select your custom application.
* Ensure that the values in the following columns are set to Any:

* Protected Scope
* Source
* Destination
* Services

1. Install Policy: Install the Threat Prevention policy.
2. Clear Caches: Make sure to clear the DNS caches on the used DNS servers and the Malware Cache on the gateway. For instructions, refer to sk105179

View solution in original post

(1)
13 Replies
PhoneBoy
Admin
Admin

Seems like you could create a custom application definition for said domains and create an exception for it in your Threat Prevention policy.
Something like this:

Screen Shot 2019-06-14 at 4.03.57 PM.png

@Vladimir this might also be a solution to the thread you raised about this as well.

Vladimir
Champion
Champion

@PhoneBoy  perhaps this would work, if CHeck Point is the one blocking it.

When I've added KnowBe4 domains to the categorization exceptions, the problems persisted, so in my case this was the issue:

When querying the https.protected-forms.com from inside the network, I was getting "can't find" in nslookup:

image.png

Looking in Check Point for this query, we see that it detects it as the query for malicious domain, but it allows it:

image.png

Finally, looking at the public DNS resolver that the Domain Controller forwarding the queries to, (IBM's Secure DNS Service Quad 9):

image.png

 

I have reached out to KnowBe4 and they are working on whitelisting this domain with threat intelligence providers.

bcsw222
Participant

I know this is an old thread - but I've attempted to do this and haven't had any success.

 

I believe the issue is that Custom site/Applications only detect on ports 80/443/8080. Not DNS (port 53), which is what is being Prevented in the logs.

 

There doesn't seem to be a way to add additional Match-By criteria to custom site/applications in Check Point. I could add DNS to an existing App - but not a custom site/application.

 

Do you know if there's a way to get around this? I'll have to disable the AV protection on my Threat Prevention profile if I can't get exceptions working for these Microsoft Attack Simulation URLs.

0 Kudos
PhoneBoy
Admin
Admin

Custom Application/Site objects use the settings for Web Browsing.
Those can be changed here (though adding DNS might result in a performance impact):

image.png

If you know the domains used, you can create FQDN Domain objects and use those in the exception (with service Any).
This assumes your gateway and clients resolve DNS the same.

0 Kudos
bmartins-EUDA
Contributor

This doesn't seem to be working here (R81.20).

I have a list of domains that are already exempt from IPS and HTTPS inspection as they're used in phishing campaigns, but cannot find a way to make an exception on the DNS Reputation protection.

Any other tip?

Thanks!

0 Kudos
PhoneBoy
Admin
Admin

What specific things have you tried above any beyond the Custom Application/Site object?
In the "answer" for this thread, I had an FQDN Domain object (which I'm not 100% sure works).
If you're on R81.20, you might also try a Network Feed with the relevant domains included.

0 Kudos
PhoneBoy
Admin
Admin

I did find an interesting tidbit in the R82 Threat Prevention guide that might help: "To add an exception to a DNS protection, you must go to the relevant log and add it from there."
This means right-click the log and select Add Exception.

0 Kudos
bcsw222
Participant

If memory serves - this creates an exclusion for the detection name, not the domain. I was never able to get exclusions working for domains. The only way I could prevent the detection was by the detection name, which was untenable for Microsoft's attack simulation URLs. There are 130+ domains each with a unique detection name. This is one of those things where I feel it should be simple to exclude detections from the domain name considering it's a domain name resolution threat prevention mechanism. I hope CheckPoint implements a way to do this in the future.

PhoneBoy
Admin
Admin

It's also possible this note is specific to R82, since it is in the R82 documentation.

0 Kudos
bmartins-EUDA
Contributor

Thanks for your quick reply!

It looks like a network feed isn't a supported object in this scope.

2024-11-08 17_39_11-mRemoteNG - EMCDDA Servers.xml - sccm-siteserver.emcdda.org.png

0 Kudos
PhoneBoy
Admin
Admin

According to TAC case I've seen, it should be supported to use a Custom Application/Sites.
Here are the steps I found from one TAC case where the customer confirmed it works.

For Anti-Virus Configuration (R81.10, R81.20)

1. Verify Anti-Virus Blade: Ensure that the Anti-Virus blade is enabled.
2. Create Custom Application/Site:

* In SmartConsole, navigate to New > More > Custom Application/Site > Application/Site.
* Name the Application/Site and insert the domains into the URL list.
* Ensure the checkbox for "URLs are defined as Regular Expression" is unchecked.

1. Add Exception:

* Go to Security Policies > Threat Prevention > Exceptions.
* Click on Global Exceptions, then Add Exception > Above to create a new rule.
* Change the Action to Inactive.
* In the Protection/Site/File/Blade section, select your custom application.
* Ensure that the values in the following columns are set to Any:

* Protected Scope
* Source
* Destination
* Services

1. Install Policy: Install the Threat Prevention policy.
2. Clear Caches: Make sure to clear the DNS caches on the used DNS servers and the Malware Cache on the gateway. For instructions, refer to sk105179

(1)
bmartins-EUDA
Contributor

That worked!

Doing "the same" through the "custom policy" tab didn't however.

0 Kudos
PhoneBoy
Admin
Admin

Glad it did and I've updated the "correct" answer accordingly. 🙂

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events