- Products
- Learn
- Local User Groups
- Partners
- More
Check Point Jump-Start Online Training
Now Available on CheckMates for Beginners!
Why do Hackers Love IoT Devices so Much?
Join our TechTalk on Aug 17, at 5PM CET | 11AM EST
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
ZTNA Buyer’s Guide
Zero Trust essentials for your most valuable assets
The SMB Cyber Master
Boost your knowledge on Quantum Spark SMB gateways!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hello experts,
Kindly guide me if its possible to have like a rule, blade or external connector or any recommended configuration in order to have protection on the Gateway perimeter to block malicious reported IP address range like botnets, hackers etc? This is with the purpose to reduce having to create objects and manually applied to specific existing block rule on the network access layer.
Thanks!
ioc_feeds, available natively in R81 SmartConsole - refer sk132193.
Other options exist depending on your enabled blades and might leverage dynamic / imported objects (sk167210) or the available APIs.
Hey bro,
What I always do is use below link, get all IPs from the txt file, slap it in .csv file, import in mgmt, create a rule with group object containing the file you import and thats it.
Andy
You can also use below sites to confirm if site might be malicious.
ioc_feeds, available natively in R81 SmartConsole - refer sk132193.
Other options exist depending on your enabled blades and might leverage dynamic / imported objects (sk167210) or the available APIs.
Hey bro,
What I always do is use below link, get all IPs from the txt file, slap it in .csv file, import in mgmt, create a rule with group object containing the file you import and thats it.
Andy
You can also use below sites to confirm if site might be malicious.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY