- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- IPS Protection Update
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Jump to solution
IPS Protection Update
Can Checkpoint add a new feature that will allow for customers to download custom cve's files from different vendors to match the customers infrastructure and equipment? Currently, Checkpoint pushed new cve's but many of them do not match our needs. is it possible in near future to offer this feature.
1 Solution
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
By custom CVE, I assume you mean a custom signature to address a specific CVE.
We've allowed customers to import snort signatures for several versions now.
We've allowed customers to import snort signatures for several versions now.
4 Replies
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
By custom CVE, I assume you mean a custom signature to address a specific CVE.
We've allowed customers to import snort signatures for several versions now.
We've allowed customers to import snort signatures for several versions now.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I know we can add snort rules but not signatures, do you have any document showing how to import snort signatures into IPS protection.
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Aren't snort signatures just a series of snort rules?
In any case, this should be covered in the Threat Prevention docs.
For R80.30: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
In any case, this should be covered in the Threat Prevention docs.
For R80.30: https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Gotcha!
