<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using CP Infinity Portal How does one find out what was extracted or triggered threat extraction? in Browse</title>
    <link>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/165601#M40</link>
    <description>&lt;P&gt;I have a user that received a file that in the logs shows it had triggered TEX.&lt;/P&gt;
&lt;P&gt;Using the panel on the right side of Infinity portal shows it has threat of Low, confidence High but&lt;/P&gt;
&lt;P&gt;it offers no detail as to what the threat was. I don't find this of much value.&lt;/P&gt;
&lt;P&gt;'Yah, there was a threat. We got rid of it.'&lt;/P&gt;
&lt;P&gt;It would be nice to know what the threat&lt;/P&gt;
&lt;P&gt;was so that our user could inform the sender they may themselves be infected with&lt;/P&gt;
&lt;P&gt;malware. For businesses with close personal relationships and daily transactions with&lt;/P&gt;
&lt;P&gt;one another this sort of thing is very important.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see no way to drill down into the&lt;/P&gt;
&lt;P&gt;threat for additional detail and the details provided offer nothing more than technical&lt;/P&gt;
&lt;P&gt;mumbo jumbo about resource URL's, file hashes byte size and a vague Description.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess that makes this a request for additional functionality. Something&lt;/P&gt;
&lt;P&gt;like Adware/TrackingPixel or EmbeddedWebLink/Graphic would be helpful in &lt;/P&gt;
&lt;P&gt;understanding the nature of what was removed during TEX.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 19 Dec 2022 19:07:36 GMT</pubDate>
    <dc:creator>Tony_Graham</dc:creator>
    <dc:date>2022-12-19T19:07:36Z</dc:date>
    <item>
      <title>Using CP Infinity Portal How does one find out what was extracted or triggered threat extraction?</title>
      <link>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/165601#M40</link>
      <description>&lt;P&gt;I have a user that received a file that in the logs shows it had triggered TEX.&lt;/P&gt;
&lt;P&gt;Using the panel on the right side of Infinity portal shows it has threat of Low, confidence High but&lt;/P&gt;
&lt;P&gt;it offers no detail as to what the threat was. I don't find this of much value.&lt;/P&gt;
&lt;P&gt;'Yah, there was a threat. We got rid of it.'&lt;/P&gt;
&lt;P&gt;It would be nice to know what the threat&lt;/P&gt;
&lt;P&gt;was so that our user could inform the sender they may themselves be infected with&lt;/P&gt;
&lt;P&gt;malware. For businesses with close personal relationships and daily transactions with&lt;/P&gt;
&lt;P&gt;one another this sort of thing is very important.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see no way to drill down into the&lt;/P&gt;
&lt;P&gt;threat for additional detail and the details provided offer nothing more than technical&lt;/P&gt;
&lt;P&gt;mumbo jumbo about resource URL's, file hashes byte size and a vague Description.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I guess that makes this a request for additional functionality. Something&lt;/P&gt;
&lt;P&gt;like Adware/TrackingPixel or EmbeddedWebLink/Graphic would be helpful in &lt;/P&gt;
&lt;P&gt;understanding the nature of what was removed during TEX.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Dec 2022 19:07:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/165601#M40</guid>
      <dc:creator>Tony_Graham</dc:creator>
      <dc:date>2022-12-19T19:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Using CP Infinity Portal How does one find out what was extracted or triggered threat extraction</title>
      <link>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/165734#M41</link>
      <description>&lt;P&gt;Every supported file type will invoke Threat Extraction whether or not it’s actually malicious.&lt;BR /&gt;Documents are reconstructed in a way that potentially malicious content won’t be there (for example, VB Macros will be removed).&lt;BR /&gt;Or the document will be converted to PDF, if that’s how you configure the policy.&lt;BR /&gt;The precise details of how Threat Extraction does this are not documented anywhere and there is no logging provided about what was done.&lt;/P&gt;
&lt;P&gt;If you want to know if a document is actually malicious or not (and how), use Threat Emulation.&lt;BR /&gt;In fact, that’s how Threat Extraction is intended to be used (with Threat Emulation).&lt;BR /&gt;Threat Emulation reports provide details about how the document was malicious (if it was).&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 01:59:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/165734#M41</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-21T01:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Using CP Infinity Portal How does one find out what was extracted or triggered threat extraction</title>
      <link>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/182352#M42</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24239"&gt;@Tony_Graham&lt;/a&gt;&amp;nbsp; - wanted to circle back to this request you made a couple of months ago.&amp;nbsp;&lt;BR /&gt;Although the response you've got from&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;is correct, I agreed with the need to provide additional information on the extracted content.&amp;nbsp;&lt;BR /&gt;Therefore, we've added to the logs under "Description" the name of the elements that were removed (according to the defined list we have in the portal).&amp;nbsp;&lt;BR /&gt;This is already in production for FireFox downloads and will shortly be available for downloads from all supported browsers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AdiGH_0-1685268007919.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21114i0205FEE82E3E853D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="AdiGH_0-1685268007919.png" alt="AdiGH_0-1685268007919.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I hope you'll find this useful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 10:03:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Browse/Using-CP-Infinity-Portal-How-does-one-find-out-what-was/m-p/182352#M42</guid>
      <dc:creator>AdiGH</dc:creator>
      <dc:date>2023-05-28T10:03:15Z</dc:date>
    </item>
  </channel>
</rss>

