- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
All links posted on Twitter.com get redirected to a link with https://t.co. Our Threat Prevention blade is seeing this as malicious and is sending the traffic to the Malware DNS Trap set as part of our Threat Prevention Policy. I can't see any way to by pass this for t.co or stop this without turning off the Malware DNS Trap all together. I have verified the links are legit.
Has anyone else seen this behavior or know a way to fix this issue? R80.40 Gateways and R81.10 Firewall Manager. We've had this happen before and was cleared after updates but is back again. I'd like a way to stop this on known good URLs.
You can set a global exception for this by creating a Custom Application/Site for https://t.co and putting it in a rule in your Threat Prevention policy.
Beyond that, please report the false positive to TAC.
We have a ticket with TAC and will try to find a root cause for the issue. Thanks for the tip to bypass it for now.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY