Configuring Threat Extraction Settings

Note - You can configure some of the Threat Extraction features in a configuration file, in addition to SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. and the CLI. See sk114613.

Threat Extraction General Settings

On the Threat Extraction > General page, you can configure these settings:

UserCheck Settings

Protocol

For information on storage of the original files, see Storage of Original Files.

Extraction Method

  • Extract potentially malicious parts from files - Selected by default

    Click Configure to select which malicious parts the Software Blade extracts. For example, macros, JavaScript, images and so on.

  • Convert to PDF - Converts the file to PDF, and keeps text and formatting.

    Best Practice - If you use PDFs in right-to-left languages or Asian fonts, preferably select Extract files from potential malicious parts to make sure that these files are processed correctly.

Extraction Settings

  • Process all files

    Selected by default.

  • Process malicious files when the confidence level is

    Set a Low, Medium, or High confidence level. This option is only configurable when the Threat Emulation Software Blade is activated in the General Properties pane of the profile.

File Types

  • Process all enabled file types - This option is selected by default. Click the blue link to see the list of supported file types. Out of the supported file types, select the files to be scanned by the Threat Extraction Software Blade.

    Note - You can find this list of supported file types also in Manage & Settings view > Blades > Threat Prevention > Advanced Settings > Threat Extraction > Configure File Type Support.

  • Process specific file type families

    Here you can configure a different extraction method for certain file types. Click Configure to see the list of enabled file types and their extraction methods. To change the extraction method for a file type, right-click the file type and select: bypass, clean or convert to PDF. You can select a different extraction method for Mail and Web.

Notes:

  • Supported file types for web are: Word, Excel, PowerPoint and PDF.

  • For e-mail attachments:

    • For jpg, bmp, png, gif, and tiff files - Threat Extraction supports only extraction of potentially malicious content.

    • For hwp, jtd, eps files - Threat Extraction supports only conversion to PDF.

    • For Microsoft Office and PDF files and all other file types on the list - Threat Extraction supports both extraction of potentially malicious content and conversion to PDF.

    • You can also configure supported file types in the configuration file. For explanation, see sk112240.

Protected Scope

Threat Extraction protects incoming files from external interfaces and DMZ. The user cannot configure the protected scope.

Threat Extraction Advanced Settings

On the Threat Extraction > Advanced page, you can configure these settings:

Use Cases

Scenario 1: Excluding senders from scanning

Scanning takes time and resources, so if you know a source is safe, you may want to stop scanning the reports from this source.

Example:

  • Control and Monitoring systems that send daily reports to IT departments.

  • Reports sent by a Mail Relay server about spam emails that it stopped.

Scenario 2: Allowing digitally signed emails without scanning

The attorneys at the legal department in Corp X send and receive contracts and other legal documents signed with a digital signature. According to Corp X's Security PolicyClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection., the Threat Extraction blade scans all files received by the legal department. A digital signature must show the authenticity of a document. If the Threat Extraction blade scans the document, the digital signature can no longer prove the document's authenticity. The configuration, therefore, must allow digitally signed emails.

In the profile settings > Mail > Exceptions > Threat Extraction Exceptions > Signed email attachments, the default option is Allow. This configuration makes sure that when you receive a digitally signed email, it will be allowed with no scanning, so the form of the email does not change.

Scenario 3:

For security reasons, the IT department in Corp X changed the default extraction method in the Threat Prevention profile from Extract potentially malicious parts from files to Convert to PDF.

The economists in the Finance Department in Corp X receive certain files by email in excel formats, or download excel files from the Web, and must work on them in the files' original format. To keep the excel files in their original formats you must set the Threat Extraction to clean the files and not convert them to PDF.