Threat Emulation - General
What can I do here?
Use this window to configure general Threat Emulation settings.
|
Getting Here - Security Policies Threat Prevention > Policy > Threat Tools > Profiles > Profile > Threat Emulation - General
|
Configuring Threat Emulation Settings
Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly. To do this:
- In SmartConsole, click and double-click the Security Gateway.
The gateway window opens and shows the page.
- From the navigation tree, click and then double-click a DMZ interface.
- In the page of the window, click .
- In the window, click and .
- Click and close the gateway window.
Do this procedure for each interface that goes to the DMZ.
If there is a conflict between the Threat Emulation settings in the profile and for the Security Gateway, the profile settings are used.
Note - The MIME Nesting settings are the same for Anti-Virus, Threat Emulation and Threat Extraction.
To configure Threat Emulation settings for a Threat Prevention profile:
- In SmartConsole, select .
- From the section, click .
The page opens.
- Right-click the profile, and click .
- From the navigation tree, click .
- Select the Threat Emulation options:
- - Select the UserCheck message that opens for a action
- - Select the UserCheck message that opens for an action
- In the section, select an interface type and traffic direction option:
- Select the applicable to be emulated.
- In the section, select an interface type and traffic direction option:
- Optional: Configure how Threat Emulation does emulation for SMTP traffic. Click the link.
- Select the to be emulated.
- In, click to block archives that contain file types selected in the list.
- Click and close the Threat Prevention profile window.
- Install the Threat Prevention policy.
Threat Emulation General Settings
On the page, you can configure these settings:
- :
- - Select the UserCheck message that opens for a action
- - Select the UserCheck message that opens for an action
- . Select an interface type and traffic direction option:
- to be emulated.
- - Click to configure the SMTP traffic inspection by the Threat Emulation blade. This links you to the page of the Profile settings.
- . Here you can configure the Threat Emulation and for each file type scanned by the Threat Emulation blade. Select one of these:
- - This option is selected by default. Click the blue link to see the list of supported file types. Out of the supported file types, select the files to be scanned by the Threat Emulation blade.
Note - you can find this list of supported file types also in view > > > > > .
- -Click to change the action or emulation location for the scanned file types.
To change the emulation action for a file type, click the applicable action in the column and select one of these options:
- - The Threat Emulation blade scans these files.
- - Files of this type are considered safe and the Software Blade does not do emulation for them.
To change the emulation location for a file type, click and select one of these options:
- - The is according to the settings defined in the window of each gateway.
- - Emulation for these file types is done on the gateway.
- - These file types are sent to the ThreatCloud for emulation.
- -. Click to select the prohibited file types. If a prohibited file type is in an archive, the gateway drops the archive.
Emulation Environment
You can use the window to configure the emulation location and images that are used for this profile:
Advanced Threat Emulation Settings
- lets you configure Threat Emulation to allow or block a connection while it finishes the analysis of a file. You can also specify a different mode for SMTP and HTTP services.
- - The connection is allowed and the file goes to the destination even if the emulation is not finished.
- - A connection that must have emulation is blocked and Threat Emulation holds the file until the emulation is complete. This option can create a time-delay for users to receive emails and files.
- - Lets you configure different modes for HTTP and SMTP. For example, you can set HTTP to and SMTP to .
Best Practice - For configurations that use Hold mode for SMTP traffic, we recommend that you use an MTA deployment.
If you use the action, a file that Threat Emulation already identified as malware is blocked. Users cannot get the file even in mode.
- optimizes file analysis by doing an initial analysis on files. If the analysis finds that the file is simple and cannot contain malicious code, the file is sent to the destination without additional emulation. Static analysis significantly reduces the number of files that are sent for emulation. If you disable it, you increase the percentage of files that are sent for full emulation. The Security Gateways do static analysis by default, and you have the option to disable it.
- lets you configure the system to generate logs for each file after emulation is complete.