Threat Prevention Engine Settings - Autonomous Threat Prevention

This section explains how to configure advanced Threat Prevention settings that are in the Engine Settings window, including: inspection engines, the Check Point Online Web Service (ThreatCloudClosed The cyber intelligence center of all of Check Point products. Dynamically updated based on an innovative global network of threat sensors and invites organizations to share threat data and collaborate in the fight against modern malware. repository), internal email whitelist, file type support for Threat ExtractionClosed Check Point Software Blade on a Security Gateway that removes malicious content from files. Acronym: TEX. and Threat EmulationClosed Check Point Software Blade on a Security Gateway that monitors the behavior of files in a sandbox to determine whether or not they are malicious. Acronym: TE. and more.

To get to the Engine Settings window, go to Manage & Settings > Blades > Threat Prevention > Advanced Settings.

The Threat Prevention Engine Settings window opens.

Fail Mode

Select the behavior of the ThreatSpect engine if it is overloaded or fails during inspection. For example, if the Anti-BotClosed Check Point Software Blade on a Security Gateway that blocks botnet behavior and communication to Command and Control (C&C) centers. Acronyms: AB, ABOT. inspection is terminated in the middle because of an internal failure. By default, in such a situation all traffic is allowed.

  • Allow all connections (Fail-open) - All connections are allowed in a situation of engine overload or failure (default).

  • Block all connections (Fail-close) - All connections are blocked in a situation of engine overload or failure.

By default, all Security Gateways that are controlled by a single Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server., act the same according to t fail mode configuration of the Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

Starting from R81.20, you can control the fail mode configuration for each individual Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. by using the malware_config file.

Valid Values

Value

Description

by_policy

This is the default value. Fail mode is determined by the policy.

open

All connections to the specific Security Gateway are allowed in a situation of engine overload or failure.

close

All connections to the specific Security Gateway are blocked in a situation of engine overload or failure.

To set fail mode on a specific Security Gateway:

  1. Connect to the command line on the Security Gateway.

  2. Log in to the Expert mode.

  3. Backup the current $FWDIR/conf/malware_config file:

    [Expert@HostName]# cp $FWDIR/conf/malware_config $FWDIR/conf/malware_config_ORIGINAL

  4. Set the required fali mode for the specific Security Gateway:

    To set the fail mode to be controlled by the policy, run:

    [Expert@HostName]# sed -ie 's/^fail_close=.*$/fail_close=by_policy/' $FWDIR/conf/malware_config

    To set the fail mode to "open", run:

    [Expert@HostName]# sed -ie 's/^fail_close=.*$/fail_close=open/' $FWDIR/conf/malware_config

    To set fail mode to "close", run:

    [Expert@HostName]# sed -ie 's/^fail_close=.*$/fail_close=close/' $FWDIR/conf/malware_config

Check Point Online Web Service

The Check Point Online Web Service is used by the ThreatSpect engine for updated resource categorization. The responses the Security Gateway gets are cached locally to optimize performance. Access to the cloud is required if the response is not cached. Resource classification mode determines if the connection is allowed or suspended while the Security Gateway queries the Check Point Online Web Service.

Connection Unification

Gateway traffic generates a large amount of activity. To make sure that the amount of logs is manageable, by default, logs are consolidated by session. A session is a period that starts when a user first accesses an application or a site. During a session, the gateway records one log for each application or site that a user accesses. All activity that the user does within the session is included in the log. For connections that are allowed or blocked the Anti-Bot, Threat Emulation, and Anti-Virus, the default session is 10 hours (600 minutes).

Configuring Anti-Bot Whitelist

The Suspicious Mail engine scans outgoing emails. You can create a list of email addresses or domains whose internal emails are not inspected by Anti-Bot.

File Type Support for Threat Emulation and Threat Extraction

File Type Support for Threat Emulation and Threat Extraction in Autonomous Threat Prevention is not configured in Engine Settings. To configure file type support settings for Autonomous Threat Prevention, go to Security PoliciesClosed Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. > Autonomous Policy > File Protections.