What can I do here?
Use this window to configure:
Getting Here - Security Policies > Threat Prevention > Policy > Threat Tools > Profiles > Profile > Edit > Threat Extraction > General |
To configure Threat Extraction settings for a Threat Prevention profile:
The Profiles properties window opens.
Note - You can configure some of the Threat Extraction features in a configuration file, in addition to the CLI and GUI. See sk114613.
On the Threat Extraction > General page, you can configure these settings:
UserCheck Settings
Note - This option is only configurable when the Threat Emulation blade is activated in the General Properties pane of the profile.
Select a message to show the user when the user receives the clean file. In this message, the user selects if they want to download the original file or not. To select the success or cancelation messages of the file download, go to Manage & Settings > Blades > Threat Prevention > Advanced Settings > UserCheck. You can create or edit UserCheck messages on the UserCheck page. You can customize a UserCheck message only for SMTP files. For HTTP files (supported on R80.30 gateways and above), the message which the user gets is not customizable in SmartConsole. You can only customize it on the gateway.
Send Original Mail is added to the message body.
Protocol
To enable web support on other ports, create a new TCP service. In General > Protocol select HTTP, and in Match By, select Customize and enter the required port number.
Notes:
For information on storage of the original files, see Storage of Original Files.
Extraction Method
Click Configure to select which malicious parts the blade extracts. For example, macros, JavaScript, images and so on.
Extraction Settings
Set a low, medium or high confidence level. This option is only configurable when the Threat Emulation blade is activated in the General Properties pane of the profile.
File Types
Note - you can find this list of supported file types also in Manage & Settings view > Blades > Threat Prevention > Advanced Settings > Threat Extraction > Configure File Type Support.
Here you can configure a different extraction method for certain file types. Click Configure to see the list of enabled file types and their extraction methods. To change the extraction method for a file type, right-click the file type and select: bypass, clean or convert to pdf. You can select a different extraction method for Mail and Web.
Notes:
For e-mail attachments:
Protected Scope
Threat Extraction protects incoming files from external interfaces and DMZ. The user cannot configure the protected scope.
On the Threat Extraction > Advanced page, you can configure these settings:
Block or Allow corrupted files attached to the email or downloaded from the web. Corrupted files are files the blade fails to process, possibly because the format is incorrect. Despite the incorrect format, the related application (Word, Adobe Reader) can sometimes show the content.
Block removes the corrupted file and sends the recipient a text which describes how the file contained potentially malicious content. You can block corrupt files if they are malicious according to Threat Emulation. If the action is block, you can deny access to the original corrupted file.
Allow lets the recipient receive the corrupted file.
Block or Allow encrypted files attached to the email or downloaded from the web.
Block removes the encrypted file and sends the recipient a text file which describes how the file contained potentially malicious content.
If the action is block, you can also deny access to the original encrypted file.
Allow lets the recipient receive the encrypted file.