<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event handling on ThreatEmulation detecting malicious files? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/105556#M13202</link>
    <description>&lt;P&gt;Hey Danny,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see answers below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q: Will I receive an immdiate notification about this? This is critical as a malicious file was successfully downloaded.&lt;/LI&gt;
&lt;LI&gt;A: N&lt;STRONG&gt;otification will not be sent by default, see next answer for instructions how to configure such notification.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;(a Detect log will be generated with a reason for file &lt;/STRONG&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;passion&lt;/STRONG&gt;&lt;/FONT&gt;&lt;STRONG&gt;&amp;nbsp;(GW is configured as Rapid delivery)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q: Is an event being generated? How do I know about this?&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;A: &lt;STRONG&gt;in order to get a notification, we can create custom event in SmartEvent, it will be created and send notification when a log with action detect and verdict malicious will be created by Threat Emulation:&lt;/STRONG&gt; &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Open SmartConsole and go to Logs and Monitor view&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Open New Tab&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- At the bottom-left side menu click on :&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Shiran_Benatar_0-1608113281974.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9762i5D30DE87D927A56C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Shiran_Benatar_0-1608113281974.png" alt="Shiran_Benatar_0-1608113281974.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- SmartEvent GUI will be opened&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Go to Legacy – ThreatPrevention – Right click on ThreatEmulation ad configure the conditions as followed:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Shiran_Benatar_1-1608104135620.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9755i0EE64A155E27D09C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Shiran_Benatar_1-1608104135620.png" alt="Shiran_Benatar_1-1608104135620.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;Click on Save as&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;After creating this event, you can configure automatic reaction (for more details please refer to logging and monitoring admin guide : &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Automatic-Reactions.htm?Highlight=automatic%20reaction" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Automatic-Reactions.htm?Highlight=automatic%20reaction&lt;/A&gt;) &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q:Which SmartEvent view would allow me to check how many times such situations occurred within the last 30 days?&lt;/LI&gt;
&lt;LI&gt;A:&amp;nbsp;&lt;STRONG&gt;I have created a view for this propose (attached), in this view you’ll be able to see all files were detected with verdict malicious (you can also use the same filter in log search – Blade:ThreatEmulation AND verdict: Malicious and action: Detect).&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; The view contain a table with source, destination, filename, Severity, Confidence Level, and you can add/remove other fields according to environment needs.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Hope I was able to assist.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Let me know if further information is required.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Have a nice day,&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Shiran&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Dec 2020 10:08:12 GMT</pubDate>
    <dc:creator>Shiran_Gold</dc:creator>
    <dc:date>2020-12-16T10:08:12Z</dc:date>
    <item>
      <title>Event handling on ThreatEmulation detecting malicious files?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/102271#M13200</link>
      <description>&lt;P&gt;How does Check Point notify me if I download an executable that is subsequently detected as malicious by ThreatEmulation?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Check Point ThreatPrevention uses the &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Content/Topics-TPG/Threat_Prevention_Profiles.htm?TocPath=Threat%20Prevention%20Profiles|_____2#Optimized_Protection_Profile_Settings" target="_self"&gt;Optimized profile&lt;/A&gt; "&lt;EM&gt;by default, because it gives excellent security with good gateway performance.&lt;/EM&gt;"&lt;BR /&gt;The default handling mode of this profile is &lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_ThreatPrevention_AdminGuide/Content/Topics-TPG/Threat-Emulation-Solution.htm?TocPath=The%20Threat%20Emulation%20Solution|Threat%20Emulation%20Handling%20Mode|_____0#Threat_Emulation_Handling_Mode" target="_self"&gt;Rapid Delivery&lt;/A&gt;&lt;/STRONG&gt; (&lt;EM&gt;formerly known as &lt;STRONG&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_ThreatPrevention_AdminGuide/138634.htm#o206701" target="_self"&gt;Background Mode&lt;/A&gt;&lt;/STRONG&gt;&lt;/EM&gt;).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 487px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8975i1CA925695330BAE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This means the&amp;nbsp;&lt;SPAN&gt;connection is allowed and the file goes to the destination even if the emulation is not finished, i.e. the gateway sends the original file to the user (&lt;EM&gt;even if it turns out eventually that the file is malicious&lt;/EM&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;When using Threat Extraction&lt;/STRONG&gt; together with Threat Emulation &lt;STRONG&gt;it's best practice to switch to Maximum Protection&lt;/STRONG&gt; (&lt;EM&gt;formerly known as Hold Mode&lt;/EM&gt;). However, the Optimized profile does not automatically check and adjust accordingly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;So when Check Point delivered a file to the end user and later detects that the file was malicious.. what happens?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Will I receive an immdiate notification about this? This is critical as a malicious file was successfully downloaded.&lt;/LI&gt;
&lt;LI&gt;Is an event being generated? How do I know about this?&lt;/LI&gt;
&lt;LI&gt;Which SmartEvent view would allow me to check how many times such situations occured within the last 30 days?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Thanks for replying!&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 11:03:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/102271#M13200</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-11-17T11:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: Event handling on ThreatEmulation detecting malicious files?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/104948#M13201</link>
      <description>&lt;P&gt;I would also be interested in this.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 10:32:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/104948#M13201</guid>
      <dc:creator>Joshua</dc:creator>
      <dc:date>2020-12-10T10:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Event handling on ThreatEmulation detecting malicious files?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/105556#M13202</link>
      <description>&lt;P&gt;Hey Danny,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please see answers below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q: Will I receive an immdiate notification about this? This is critical as a malicious file was successfully downloaded.&lt;/LI&gt;
&lt;LI&gt;A: N&lt;STRONG&gt;otification will not be sent by default, see next answer for instructions how to configure such notification.&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;(a Detect log will be generated with a reason for file &lt;/STRONG&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;passion&lt;/STRONG&gt;&lt;/FONT&gt;&lt;STRONG&gt;&amp;nbsp;(GW is configured as Rapid delivery)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q: Is an event being generated? How do I know about this?&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;A: &lt;STRONG&gt;in order to get a notification, we can create custom event in SmartEvent, it will be created and send notification when a log with action detect and verdict malicious will be created by Threat Emulation:&lt;/STRONG&gt; &amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Open SmartConsole and go to Logs and Monitor view&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Open New Tab&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- At the bottom-left side menu click on :&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Shiran_Benatar_0-1608113281974.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9762i5D30DE87D927A56C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Shiran_Benatar_0-1608113281974.png" alt="Shiran_Benatar_0-1608113281974.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- SmartEvent GUI will be opened&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;- Go to Legacy – ThreatPrevention – Right click on ThreatEmulation ad configure the conditions as followed:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Shiran_Benatar_1-1608104135620.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/9755i0EE64A155E27D09C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Shiran_Benatar_1-1608104135620.png" alt="Shiran_Benatar_1-1608104135620.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;Click on Save as&lt;/P&gt;
&lt;P class="lia-indent-padding-left-90px"&gt;After creating this event, you can configure automatic reaction (for more details please refer to logging and monitoring admin guide : &lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Automatic-Reactions.htm?Highlight=automatic%20reaction" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_LoggingAndMonitoring_AdminGuide/Topics-LMG/Automatic-Reactions.htm?Highlight=automatic%20reaction&lt;/A&gt;) &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Q:Which SmartEvent view would allow me to check how many times such situations occurred within the last 30 days?&lt;/LI&gt;
&lt;LI&gt;A:&amp;nbsp;&lt;STRONG&gt;I have created a view for this propose (attached), in this view you’ll be able to see all files were detected with verdict malicious (you can also use the same filter in log search – Blade:ThreatEmulation AND verdict: Malicious and action: Detect).&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp; &amp;nbsp; The view contain a table with source, destination, filename, Severity, Confidence Level, and you can add/remove other fields according to environment needs.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Hope I was able to assist.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Let me know if further information is required.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Have a nice day,&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Shiran&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2020 10:08:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Event-handling-on-ThreatEmulation-detecting-malicious-files/m-p/105556#M13202</guid>
      <dc:creator>Shiran_Gold</dc:creator>
      <dc:date>2020-12-16T10:08:12Z</dc:date>
    </item>
  </channel>
</rss>

