<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMTP Emulation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/54197#M13378</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm able to create reaction but I don't know how to filter by critical severity and SMTP protocole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 May 2019 07:50:38 GMT</pubDate>
    <dc:creator>chico</dc:creator>
    <dc:date>2019-05-23T07:50:38Z</dc:date>
    <item>
      <title>SMTP Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53583#M13374</link>
      <description>&lt;P&gt;Hello everybody,&lt;BR /&gt;I'm new in the checkpoint devices and I have a question about the SandBlast for smtp.&lt;BR /&gt;Recently checkpoint blocked an attachment to a customer document. It was a word (.doc) document and after looking the logs I can see that the document was bloqued to protection name "Exploited doc document"&lt;/P&gt;&lt;P&gt;If I look the forensic details I can see that the vulnerable operating systems was for (as shown on the attachement file)&lt;BR /&gt;-Win7&lt;BR /&gt;-WinXP&lt;/P&gt;&lt;P&gt;So if I use a Windows 10 operating syseme, can I dowload the document serently ?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 09:00:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53583#M13374</guid>
      <dc:creator>chico</dc:creator>
      <dc:date>2019-05-16T09:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53628#M13375</link>
      <description>Hi chico,&lt;BR /&gt;Welcome!&lt;BR /&gt;&lt;BR /&gt;No, usually when a file is malicious on one OS it is also malicious on others. The reason we use these images (XP &amp;amp; 7) is that they are the most common and therefore attackers usually make their malware run on them. In the sandbox we want to entice the malware to run. But it doesn't mean that Windows 10 is secured against this file.</description>
      <pubDate>Thu, 16 May 2019 20:14:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53628#M13375</guid>
      <dc:creator>TP_Master</dc:creator>
      <dc:date>2019-05-16T20:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53998#M13376</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Do you know how to create an alert by mail or syslog when an critical smtp Emulation event arrive ? I don't find anything about that in the smartEvent.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 08:57:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/53998#M13376</guid>
      <dc:creator>chico</dc:creator>
      <dc:date>2019-05-21T08:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/54125#M13377</link>
      <description>Are you able to create SME reaction / e-mail alert on Threat Emulation events in general? just don't know how to filter by Critical severity &amp;amp; SMTP?</description>
      <pubDate>Wed, 22 May 2019 15:20:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/54125#M13377</guid>
      <dc:creator>TP_Master</dc:creator>
      <dc:date>2019-05-22T15:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: SMTP Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/54197#M13378</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm able to create reaction but I don't know how to filter by critical severity and SMTP protocole.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 07:50:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SMTP-Emulation/m-p/54197#M13378</guid>
      <dc:creator>chico</dc:creator>
      <dc:date>2019-05-23T07:50:38Z</dc:date>
    </item>
  </channel>
</rss>

