What can I do here?
Use this window to configure general Threat Emulation settings.
Getting Here - Security Policies Threat Prevention > Policy > Threat Tools > Profiles > Profile > Threat Emulation - General |
Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly. To do this:
The gateway window opens and shows the General Properties page.
Do this procedure for each interface that goes to the DMZ.
If there is a conflict between the Threat Emulation settings in the profile and for the Security Gateway, the profile settings are used.
To configure Threat Emulation settings for a Threat Prevention profile:
The Profiles page opens.
On the Threat Emulation > General page, you can configure these settings:
UserCheck Settings:
Protected Scope:
Select an interface type and traffic direction option:
Sends only incoming files from the specified interface type for inspection. Outgoing files are not inspected. Select an interface type from the list:
Protocols
Protocols to be emulated:
File Types
Here you can configure the Threat Emulation Action and Emulation Location for each file type scanned by the Threat Emulation blade. Select one of these:
Note - you can find this list of supported file types also in Manage & Settings view > Blades > Threat Prevention > Advanced Settings > Threat Emulation > File Type Support.
To change the emulation action for a file type, click the applicable action in the Action column and select one of these options:
To change the emulation location for a file type, click Emulation Location and select one of these options:
Archives
Block archives containing these prohibited file types. Click Configure to select the prohibited file types. If a prohibited file type is in an archive, the gateway drops the archive.
You can use the Emulation Environment window to configure the emulation location and images that are used for this profile:
Note - In the Remote Emulation Appliances option, for R80.10 gateways with R80.10 Jumbo Hotfix Accumulator and R77.20 gateways, you can select multiple appliances for remote emulation. For older gateways, you can select only one appliance for remote emulation.
These are the options to select the emulation images:
Best Practice - For configurations that use Hold mode for SMTP traffic, we recommend that you use an MTA deployment.
If you use the Prevent action, a file that Threat Emulation already identified as malware is blocked. Users cannot get the file even in Background mode.