Troubleshooting - Autonomous Threat Prevention
Troubleshooting the Threat Extraction Blade
This section covers common problems and solutions.
In Global Properties > User Directory, make sure that you have selected the Use User Directory for Security Gateways option.
|
Step |
Instructions |
||||
|---|---|---|---|---|---|
|
1 |
On the gateway command line interface, run:
If the queues are flooded with requests, the Threat Extraction
|
||||
|
2 |
Make sure the queue is not full.
|
||||
|
3 |
If queues remain full, make sure that the MTA is not overloading the Security Gateway with internal requests. The MTA should be scanning only emails from outside of the organization. |
Make sure users are able to access the UserCheck
Functionality in your Security Gateway or Cluster and endpoint clients that gives users a warning when there is a potential risk of data loss or security violation. This helps users to prevent security incidents and to learn about the organizational security policy. Portal from the e-mail they get when an attachment is cleaned.
|
Step |
Instructions |
|---|---|
|
1 |
Click the link sent to users. |
|
2 |
Make sure that the UserCheck Portal opens correctly. |
|
3 |
If users are not able to access the UserCheck Portal but see the Gaia
|
|
4 |
Open CPView. Make sure the " |
The scanned attachment statistic in CPView fails to increment.
On the Security Gateway:
|
Step |
Instructions |
|---|---|
|
1 |
Make sure that the disk or directories on the Security Gateway are not full.
|
|
2 |
Make sure directories used by Threat Extraction can be written to. Run:
|
In CPView, on the Software-blades > Threat-extraction > File statistics page, the number for "internal errors" is high compared to the total number of emails.
If the ThreatSpect engine is overloaded or fails while inspecting an attachment, a log is generated. By default, attachments responsible for log errors are still sent to email recipients. To prevent these attachments being sent, set the engine's fail-over mode to Block all connections.
|
Step |
Instructions |
|---|---|
|
1 |
Go to Manage & Settings > Blades > Threat Prevention > Advanced Settings. |
|
2 |
In the Fail Mode section, select Block all connections (fail-close). |
Troubleshooting IPS for a Security Gateway
IPS
Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System). includes the ability to temporarily stop protections on a Security Gateway set to Prevent
UserCheck rule action that blocks traffic and files and can show a UserCheck message. from blocking traffic. This is useful when troubleshooting an issue with network traffic.
|
Step |
Instructions |
|---|---|
|
1 |
In SmartConsole, click Gateways & Servers and double-click the Security Gateway |
|
2 |
From the left tree, click IPS. |
|
3 |
In the Activation Mode section, click Detect Only. |
|
4 |
Click OK. |
|
5 |
Install the Access Control policy. All protections set to Prevent allow traffic to pass, but continue to track threats according to the Track setting. |