<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [Action Required] – Important notification to Customer with Threat Emulation blade enabled – An Upda in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Action-Required-Important-notification-to-Customer-with-Threat/m-p/276607#M105269</link>
    <description>&lt;P&gt;Dear valued customer,&lt;/P&gt;
&lt;P&gt;Following an internal review using newly available AI tools, we have proactively identified a potential risk in your environment related to Threat Emulation.&lt;/P&gt;
&lt;P&gt;We have already prepared a solution for you - it is imperative that you install it at the soonest possible time.&lt;/P&gt;
&lt;P&gt;Implementing the solution is a straightforward process that does not require a reboot, restart, or policy install.&lt;/P&gt;
&lt;P&gt;Be advised that this notification is relevant for customers using Threat Emulation with Gaia versions 80.40, 81, 81.10, 81.20,82, 82.10&lt;/P&gt;
&lt;P&gt;Proposed Solution- Please follow one of the two options below:&lt;/P&gt;
&lt;P&gt;Option 1 - Enable Automatic Updates (Recommended):&lt;/P&gt;
&lt;P&gt;Note: The Security Gateway / Threat Emulation appliance must have an active Internet connection.&lt;BR /&gt;Automatic downloads are enabled by default. If they were previously disabled, you must re-enable them using the following steps:&lt;BR /&gt;1. Enable the required consent flags:&lt;BR /&gt;For Gaia versions R81.20 and higher - You must enable the 'Download Security' consent flag. Refer to sk175504 (See section: 2. Enabling and Disabling the Consent Flags).&lt;BR /&gt;For Gaia versions R81.10 and lower: You must enable the 'Allow Download' consent flag. Refer to sk111080 (See section: 4. How consent flags are modified)&lt;/P&gt;
&lt;P&gt;2. Enable Automatic Updates for Threat Emulation:&lt;BR /&gt;Follow the official Administration Guide for your specific Gaia version to enable automatic updates for the Threat Emulation blade:&lt;BR /&gt;(Go to 'To enable or disable Automatic Updates for Threat Emulation')&lt;BR /&gt;R82.10: Threat Prevention Admin Guide (R82.10)&lt;BR /&gt;R82: Threat Prevention Admin Guide (R82)&lt;BR /&gt;R81.20: Threat Prevention Admin Guide (R81.20)&lt;BR /&gt;R81.10: Threat Prevention Admin Guide (R81.10)&lt;BR /&gt;R81: Threat Prevention Admin Guide (R81)&lt;BR /&gt;R80.40: Threat Prevention Admin Guide (R80.40)&lt;/P&gt;
&lt;P&gt;Option 2 - Perform an Offline Update:&lt;/P&gt;
&lt;P&gt;If your Security Gateway/ Threat Emulation appliance operates in an offline environment or cannot connect to the Internet, you must manually apply the update.&lt;BR /&gt;1. Follow the procedure to import and install an offline Threat Emulation update package as described in sk92509.&lt;BR /&gt;2. Ensure you download and install engine revision 11.36 Revision 60.990002500 or higher.&lt;/P&gt;
&lt;P&gt;Verification:&lt;BR /&gt;After completing either Option 1 or Option 2, verify that the update was successful.&lt;BR /&gt;1. Connect to the command line on your Security Gateway.&lt;BR /&gt;2. Log in to Expert mode.&lt;BR /&gt;3. Run the following command to check the current engine version: tecli advanced engine version&lt;BR /&gt;4. Confirm that the output displays version 60.990002500 or higher.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For any further questions, please contact our Technical Support or email us at contact_support@checkpoint.com.&lt;/P&gt;
&lt;P&gt;Check Point is committed to delivering the highest quality products and services. Thank you for driving this with urgency.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Sincerely,&lt;/P&gt;</description>
    <pubDate>Wed, 06 May 2026 18:23:28 GMT</pubDate>
    <dc:creator>RemoteUser</dc:creator>
    <dc:date>2026-05-06T18:23:28Z</dc:date>
    <item>
      <title>[Action Required] – Important notification to Customer with Threat Emulation blade enabled – An Upda</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Action-Required-Important-notification-to-Customer-with-Threat/m-p/276607#M105269</link>
      <description>&lt;P&gt;Dear valued customer,&lt;/P&gt;
&lt;P&gt;Following an internal review using newly available AI tools, we have proactively identified a potential risk in your environment related to Threat Emulation.&lt;/P&gt;
&lt;P&gt;We have already prepared a solution for you - it is imperative that you install it at the soonest possible time.&lt;/P&gt;
&lt;P&gt;Implementing the solution is a straightforward process that does not require a reboot, restart, or policy install.&lt;/P&gt;
&lt;P&gt;Be advised that this notification is relevant for customers using Threat Emulation with Gaia versions 80.40, 81, 81.10, 81.20,82, 82.10&lt;/P&gt;
&lt;P&gt;Proposed Solution- Please follow one of the two options below:&lt;/P&gt;
&lt;P&gt;Option 1 - Enable Automatic Updates (Recommended):&lt;/P&gt;
&lt;P&gt;Note: The Security Gateway / Threat Emulation appliance must have an active Internet connection.&lt;BR /&gt;Automatic downloads are enabled by default. If they were previously disabled, you must re-enable them using the following steps:&lt;BR /&gt;1. Enable the required consent flags:&lt;BR /&gt;For Gaia versions R81.20 and higher - You must enable the 'Download Security' consent flag. Refer to sk175504 (See section: 2. Enabling and Disabling the Consent Flags).&lt;BR /&gt;For Gaia versions R81.10 and lower: You must enable the 'Allow Download' consent flag. Refer to sk111080 (See section: 4. How consent flags are modified)&lt;/P&gt;
&lt;P&gt;2. Enable Automatic Updates for Threat Emulation:&lt;BR /&gt;Follow the official Administration Guide for your specific Gaia version to enable automatic updates for the Threat Emulation blade:&lt;BR /&gt;(Go to 'To enable or disable Automatic Updates for Threat Emulation')&lt;BR /&gt;R82.10: Threat Prevention Admin Guide (R82.10)&lt;BR /&gt;R82: Threat Prevention Admin Guide (R82)&lt;BR /&gt;R81.20: Threat Prevention Admin Guide (R81.20)&lt;BR /&gt;R81.10: Threat Prevention Admin Guide (R81.10)&lt;BR /&gt;R81: Threat Prevention Admin Guide (R81)&lt;BR /&gt;R80.40: Threat Prevention Admin Guide (R80.40)&lt;/P&gt;
&lt;P&gt;Option 2 - Perform an Offline Update:&lt;/P&gt;
&lt;P&gt;If your Security Gateway/ Threat Emulation appliance operates in an offline environment or cannot connect to the Internet, you must manually apply the update.&lt;BR /&gt;1. Follow the procedure to import and install an offline Threat Emulation update package as described in sk92509.&lt;BR /&gt;2. Ensure you download and install engine revision 11.36 Revision 60.990002500 or higher.&lt;/P&gt;
&lt;P&gt;Verification:&lt;BR /&gt;After completing either Option 1 or Option 2, verify that the update was successful.&lt;BR /&gt;1. Connect to the command line on your Security Gateway.&lt;BR /&gt;2. Log in to Expert mode.&lt;BR /&gt;3. Run the following command to check the current engine version: tecli advanced engine version&lt;BR /&gt;4. Confirm that the output displays version 60.990002500 or higher.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;For any further questions, please contact our Technical Support or email us at contact_support@checkpoint.com.&lt;/P&gt;
&lt;P&gt;Check Point is committed to delivering the highest quality products and services. Thank you for driving this with urgency.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Sincerely,&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 18:23:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Action-Required-Important-notification-to-Customer-with-Threat/m-p/276607#M105269</guid>
      <dc:creator>RemoteUser</dc:creator>
      <dc:date>2026-05-06T18:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: [Action Required] – Important notification to Customer with Threat Emulation blade enabled – An</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Action-Required-Important-notification-to-Customer-with-Threat/m-p/276631#M105278</link>
      <description>&lt;P&gt;Hello, and apologies for what might be a silly question: I’m not entirely sure whether this also affects the use of ThreadCloud. We don’t use local analysis. The Emulation Engine version on the gateway is 59.x.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 10:55:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Action-Required-Important-notification-to-Customer-with-Threat/m-p/276631#M105278</guid>
      <dc:creator>sascham</dc:creator>
      <dc:date>2026-05-07T10:55:11Z</dc:date>
    </item>
  </channel>
</rss>

