Configuring Threat Extraction on the Security Gateway - Autonomous Threat Prevention

For Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX. API support, open the Security Gateway object, go to Threat Extraction > Web API > Enable API.

Threat Extraction and Endpoint Security

When both the Threat Extraction blade and the SandBlast Agent for Browsers are activated on the network Security Gateway, a special configuration is required. Without this configuration, when you download a file, it can be cleaned twice, both by the Threat Extraction blade and by the SandBlast Agent.

To prevent this, the Security Gateway adds a digital signature to all the files cleaned by the Threat Extraction blade. When the SandBlast Agent intercepts a downloaded file. If the digital signature is verified successfully, SandBlast Agent does not clean the file, so the file is not cleaned twice.

For details on how to configure the digital signature on the Security Gateway and how to configure the Endpoint management, see sk142732.

Configuring Threat Extraction in a Cluster

The clusterClosed Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. configuration is similar to Security Gateway configuration, except for specific instructions that are only relevant to cluster.

Threat Extraction Statistics

Using the Security Gateway CLI

Storage of Original Files

The Threat Extraction blade reconstructs files (cleans or converts files to PDF) to eliminate potentially malicious content. After the Threat Extraction blade reconstructs the files, the original files are saved on the gateway for a default period.

Backup to External Storage

When you run out of disk space, you can back e-mail attachments or web downloads to external storage.

Notes:

  • In a cluster, you must configure all Cluster Members in the same way.

  • End-users cannot access files on external storage. Only the administrator can access these files.