Configuring Threat Emulation Settings

Before you define the scope for Threat Prevention, you must make sure that your DMZ interfaces are configured correctly.

Do this procedure for each interface that goes to the DMZ.

If there is a conflict between the Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. settings in the profile and for the Security Gateway, the profile settings are used.

Threat Emulation General Settings

On the Threat Emulation > General page, you can configure these settings:

UserCheck Settings

Protected Scope

Protocols

File Types

Here you can configure the Threat Emulation Action and Emulation Location for each file type scanned by the Threat Emulation Software Blade.

Archives

Block archives containing these prohibited file types. Click Configure to select the prohibited file types. If a prohibited file type is in an archive, the gateway drops the archive.

Threat Emulation Environment

You can use the Emulation Environment window to configure the emulation location and images that are used for this profile:

  • The Analysis Locations section lets you select: where the emulation is done.

    • To use the Security Gateway settings for the location of the virtual environment, click According to the gateway.

    • To configure the profile to use a different location of the virtual environment, click Specify and select the applicable option.

  • The Environments section lets you select the operating system images on which the emulation is run. If the images defined in the profile and the Security Gateway or Threat Emulation appliance are different, the profile settings are used.

    These are the options to select the emulation images:

    • To use the emulation environments recommended by Check Point security analysts, click Use Check Point recommended emulation environments.

    • To select other images for emulation, that are closest to the operating systems for the computers in your organization, click Use the following emulation environments.

Threat Emulation Advanced Settings

  • Emulation Connection Handling Mode lets you configure Threat Emulation to allow or block a connection while it finishes the analysis of a file. You can also specify a different mode for SMTP and HTTP services. See the The Threat Emulation Solution chapter for details.
  • Static Analysis optimizes file analysis by doing an initial analysis on files. If the analysis finds that the file is simple and cannot contain malicious code, the file is sent to the destination without additional emulation. Static analysis significantly reduces the number of files that are sent for emulation. If you disable it, you increase the percentage of files that are sent for full emulation. The Security Gateways do static analysis by default, and you have the option to disable it.

  • Logging lets you configure the system to generate logs for each file after emulation is complete. If Log every file scanned is enabled, then every file that is selected in Threat Emulation > General > File Types is logged, even if no operation is performed on it. If Log every file scanned is disabled, malicious files are still logged.

Additionally Supported Protocols for Threat Emulation

In addition to HTTP, FTP and SMTP protocols, which you can select in the SmartConsole, the Threat Emulation Software Blade also supports the IMAP and POP3 protocols:

Use Case

Configuring Threat Emulation location

Corp X is located in ThreatLand. The ThreatLand law does not allow you to send sensitive documents to cloud services which are outside of the country. The system administrator of Corp X has to configure the location for the Threat Emulation analysis, so that it is not done outside of the country.