Configuring Threat Extraction on the Security Gateway

Note - For offline Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX. Engine Release Updates, refer to sk165832.

In addition to configuring Threat Extraction on the gateway:

Threat Extraction and Endpoint Security

When both the Threat Extraction blade and the SandBlast Agent for Browsers are activated on the network Security Gateway, a special configuration is required. Without this configuration, when you download a file, it can be cleaned twice, both by the Threat Extraction blade and by the SandBlast Agent.

To prevent this, the Security Gateway adds a digital signature to all the files cleaned by the Threat Extraction blade. When the SandBlast Agent intercepts a downloaded file. If the digital signature is verified successfully, the SandBlast Agent does not send the file for cleaning, so the file is not cleaned twice.

For details on how to configure the digital signature on the Security Gateway and how to configure the Endpoint management, see sk142732.

Configuring Threat Extraction in a Cluster

The ClusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. configuration is similar to gateway configuration, except for specific instructions that are only relevant to cluster.

Threat Extraction Statistics

Using the Gateway CLI

Storage of Original Files

The Threat Extraction blade reconstructs files (cleans or converts files to PDF) to eliminate potentially malicious content. After the Threat Extraction blade reconstructs the files, the original files are saved on the gateway for a default period.

Mail attachments

Mail attachments are saved for a default period of 14 days.

To save the files for a longer period, you must back them up to external storage, (see Backup to External Storage).

Web downloads

Web downloads are saved for a default period of 2 days.

To save the files for a longer period, you must back them up to external storage, (see Backup to External Storage).

Backup to External Storage

When you run out of disk space, you can back e-mail attachments or web downloads to external storage.

Notes:

  • In a cluster, both members must have the same configuration.

  • End-users cannot access files in external storage, only the administrator can access these files.