Configuring Autonomous Threat Prevention

To configure Autonomous Threat Prevention in your environment, follow these steps:

Note - MTA (Mail Transfer AgentClosed Feature on a Security Gateway that intercepts SMTP traffic and forwards it to the applicable inspection component. Acronym: MTA.) is not supported by Autonomous Threat Prevention. You can manage a Security Gateway configured as MTA by Custom Threat Prevention.

Exceptions

Global exceptions are available for use by gateways configured with Autonomous Threat Prevention or a Custom Threat Prevention policy. Global exceptions that existed prior to the migration to Autonomous Threat Prevention are enforced in Autonomous Threat Prevention without any action needed.

To add global exceptions to the Autonomous Threat Prevention policy:

  1. Go to the Security Policies view > Threat Prevention > Exceptions > Global Exceptions.

  2. Add the applicable exceptions.

  3. In the Install On column, select the gateways to which each exception applies.

Deployment

The Deployment Dashboard view:

File Protections

In the File Protections page, you can:

  • View the protected file types and protection types for the selected Autonomous Threat Prevention profile.

  • Override the recommended file protections according to profile and select different protections.

To configure file protections

  1. Go to Threat Prevention > Autonomous Threat Prevention > File Protections

  2. Click on the + sign and configure the required protection.

    These are the available protections:

    You cannot override the protections for file types which are not on the list. File types which are not on the list will be inspected in all profiles.

Settings

Sanitized File Settings

These options are selected by default:

  • Allow end-users to access the original files that are not malicious according to Sandbox - After a file is cleaned/sanitized, a banner with a link to original file is added to the document. An access to original file will be allowed only if the original file is found to be benign by all Threat Prevention engines, including Sandbox. If you clear this option, you will not be able to access the original file even if it is determined as non-malicious.

  • Modify the name of the cleaned file - Select this option to modify the name of the cleaned file.

Advanced Settings

You can override the profile definitions and enable or disable a certain feature or protection, as required. Use this tool to enable or disable DNS protections. We recommend to keep Sandbox, Sanitization and Archives deep scan On.

  1. Click the plus (+) sign.

  2. From the drop-down menu, select the required feature or protection.

  3. Set to On or Off as required.

  4. Click Apply.

  5. Publish your changes.

Clearing NGTX Expiration Alerts in SmartConsole

After the NGTX license expires, and the NGTP license is installed, SmartConsole may still continue to display an error message regarding the expiration of the NGTX license. Starting from R82 Jumbo Hotfix Accumulator Take 41, you can disable the license status check for the NGTX Software Blades.

Procedure

  1. Connect to the command line on the Security Gateway / each Cluster MemberClosed Security Gateway that is part of a cluster. / Scalable Platform Security Group.

  2. If the default shell is the Expert mode, go to Gaia ClishClosed The name of the default command line shell in Check Point Gaia operating system. This is a restricted shell (role-based administration controls the number of commands available in the shell). or GaiaClosed Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. gClish:

  3. Disable the license status for the NGTX Software Blades. Run:

    cplic ignore_expired_ngtx 1
  4. Restart the Check Point services. Run:

    cpstop
    cpstart
  5. If the Security Gateway / Cluster Member / Scalable Platform Security Group works in the VSNext / Traditional VSXClosed Virtual System Extension. Check Point virtual networking solution, hosted on a computer or cluster with virtual abstractions of Check Point Security Gateways and other network devices. These Virtual Devices provide the same functionality as their physical counterparts. mode, disable the license status for the NGTX Software Blades in the context of each applicable Virtual Gateway / Virtual System:

    1. Go to the context of the applicable Virtual Gateway / Virtual System, and run:

      set virtual-system <ID>
    2. Disable the license status for the NGTX Software Blades:

      cplic ignore_expired_ngtx 1
  6. Restart the Check Point services:

    cpstop
    cpstart