Configuring Advanced Threat Emulation Settings

Updating Threat Emulation

Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. connects to the ThreatCloudClosed The cyber intelligence center of all of Check Point products. Dynamically updated based on an innovative global network of threat sensors and invites organizations to share threat data and collaborate in the fight against modern malware. to update the engine and the operating system images. The default setting for the Threat Emulation appliance is to automatically update the engine and images.

The default setting is to download the package once a day.

Best Practice - Configure Threat Emulation to download the package when there is low network activity.

Update packages for the Threat Emulation operating system images are usually more than 2GB. The actual size of the update package is related to your configuration.

Updating Threat Emulation Images

Update packages for the Threat Emulation operating system images are usually more than several Gigabytes. The actual size of the update package is related to your configuration.

The default setting is to download the package once a week on Sunday. If Sunday is a work day, we recommend that you change the update setting to a non-work day.

Fine-Tuning the Threat Emulation Appliance

You can change these advanced settings on the Threat Emulation appliance to fine-tune Threat Emulation for your deployment.

Configuring the Emulation Limits

To prevent too many files that are waiting for emulation, configure these emulation limits settings:

If emulation is not done on a file for one of these reasons, the Fail Mode settings for Threat Prevention define if a file is allowed or blocked, (see Fail Mode).

Select the behavior of the ThreatSpect engine if it is overloaded or fails during inspection. For example, if the Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. inspection is terminated in the middle because of an internal failure. By default, in such a situation all traffic is allowed.

  • Allow all connections (Fail-open) - All connections are allowed in a situation of engine overload or failure (default).

  • Block all connections (Fail-close) - All connections are blocked in a situation of engine overload or failure.

You can configure the maximum amount of time that a file waits for the Threat Emulation Software Blade to do emulation of a file. There is a different setting that configures the maximum amount of time that emails are held in the MTA, (see Configuring the Security Gateway as a Mail Transfer Agent).

If the file is waiting for emulation more than the maximum time:

  • Threat Emulation Software Blade - The Threat Prevention profile settings define if a file is allowed or blocked

  • MTA - The MTA settings define if a file is allowed or blocked

Configuring Emulation Limits

Changing the Local Cache

When a Threat Emulation analysis finds that a file is clean, the file hash is saved in a cache. Before Threat Emulation sends a new file to emulation, it compares the new file to the cache. If there is a match, it is not necessary to send it for additional emulation. Threat Emulation uses the cache to help optimize network performance. We recommend that you do not change this setting.

Changing the Size of the Local Cache

Threat Emulation Virtual Interface

The Threat Emulation appliance must have a virtual IP address and netmask to do file emulation. This setting is not used for emulation in the ThreatCloud.

Important - Only change this virtual IP address if it is already used in your network.