<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Files on Threat Emulation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29821#M13839</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a file arrives at the emulator its hash is compared with a list of hash in the emulator.&lt;/P&gt;&lt;P&gt;If it is a file that is not yet known its hash is stored to check it with the hashes of future files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the file also stored to send a clean file to the client faster?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For how long time the file is stored on the emulator?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 10 Jun 2018 09:07:37 GMT</pubDate>
    <dc:creator>Giancarlo_Cotta</dc:creator>
    <dc:date>2018-06-10T09:07:37Z</dc:date>
    <item>
      <title>Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29821#M13839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a file arrives at the emulator its hash is compared with a list of hash in the emulator.&lt;/P&gt;&lt;P&gt;If it is a file that is not yet known its hash is stored to check it with the hashes of future files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the file also stored to send a clean file to the client faster?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For how long time the file is stored on the emulator?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 09:07:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29821#M13839</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-10T09:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29822#M13840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi. The file itself is not stored in the cache. Just the hash. And how long the hash is stored.... dunno. Believe you can modify the number of file hashes to save in local cache, if I don't remember wrong.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="320" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66305_te-adv-settings.PNG" width="671" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2018 21:44:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29822#M13840</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-10T21:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29823#M13841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I'm looking this book: CP_R77_ThreatPrevention_AdminGuide.pdf.&lt;/P&gt;&lt;P&gt;In page 25 I can see:&lt;/P&gt;&lt;P&gt;******************&lt;BR /&gt;Optimizing File Emulation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Files have unique cryptographic hashes, these file hashes are stored in a database after emulation&lt;BR /&gt;is complete. Before emulation is run on a file, the appliance compares the file hash to the&lt;BR /&gt;database:&lt;BR /&gt;&amp;nbsp;&amp;nbsp; If the hash is not in the database, the file is sent for full emulation &lt;BR /&gt;&amp;nbsp;&amp;nbsp; If the hash is in the database, then it is not necessary to run additional emulation on the file&lt;BR /&gt;This database helps to optimize emulation and give better network performance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;******************&lt;/P&gt;&lt;P&gt;Please, I need to understand "optimize emulation and give better network performance".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When one file is extracted: I suppose that if one file was previously emulated and extracted is not necessary to emulate and extract this file again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if is not necessary emulate this file again, I suppose that the this file (after extraction) was store when it was emulated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, is ready to send to user when the Sandblast receive its hash again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it correct or I lost something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or the "optimization" is valid only for the files that is not necessary to emulate again because are "clean" without extraction?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thansk a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Giancarlo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 06:12:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29823#M13841</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-12T06:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29824#M13842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;optimize emulation and give better network performance&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That means, if a file hash is already stored in the cache, when a file with the same hash arrives in an email attachment or to be downloaded from web, there is no need to send it to the te for full Emulation again.&lt;BR /&gt;This reduces network traffic to a local sandblast appliance or checkpoint cloud. And if it has not to be emulated again, emulation is optimized.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;But if is not necessary emulate this file again, I suppose that the this file (after extraction) was store when it was emulated.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Not the file itself, just the file hash.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;So, is ready to send to user when the Sandblast receive its hash again.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The gateway detects a file, calculates the hash and compares it with ist file hash cache. If it's a known hash, the file is passed or dropped according to the last scan/emulation result. The sandblast will not be involved again.&lt;BR /&gt;"Sandblast" may be located on the gateway itself (emulate locally), in the cloud or on a local, separate device.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;Or the "optimization" is valid only for the files that is not necessary to emulate again because are "clean" without extraction?&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Not just the clean ones. When a file "arrives" at the Gateways which has a hash which is stored in the cache and already being classified as malicious, it will be immediately be dropped, i assume.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i am wrong, Checkpoint staff and CheckMates, please correct me, thanks &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2018 06:19:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29824#M13842</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-12T06:19:51Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29825#M13843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I'm looking in the Threat Extraction configuration.&lt;/P&gt;&lt;P&gt;I can see that in the section "Resource Allocation" there is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Delete stored original files older than ..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which kind of file are considered in this option?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see attach image&lt;IMG alt="Threat Extraction files" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66427_Files.jpg" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jun 2018 20:47:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29825#M13843</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-15T20:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29826#M13844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Suspicious / malicious files are stored in quarantine area on the sandblast appliance for further examination. For instance to check if there are false positives.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2018 05:31:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29826#M13844</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-16T05:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29827#M13845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Hi, thanks for your answers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I’m looking this document:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Day2-01-SandBlast training-SandBlast Local emulation-v1.0.pdf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;On page 39 I can see: &lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-bottom: 23.0pt;"&gt;&lt;SPAN style="color: windowtext;"&gt; Files will receive a TTL (Time To Live) in cache of 7 days &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="margin-bottom: 23.0pt;"&gt;&lt;SPAN style="color: windowtext;"&gt; After 7 days cache entries will automatically be removed &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;I suppose that the default time to live that files are stored in the cache is 7 days.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;But in the previously image that I attached before I can see default value is 14 days. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;--&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "Delete stored original files older than ..."&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Are these different kind of files?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Is there only one cache for all the VM images or one cache for all VM image?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/66431_pastedImage_1.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2018 11:06:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29827#M13845</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-16T11:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29828#M13846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Never had a Sandblast training so I don't know this document. Questions regarding ttl may be replied by Checkmates from Checkpoint&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I assume there is one cache independent of VM.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Jun 2018 13:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29828#M13846</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-06-16T13:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29829#M13847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Giancarlo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a confusion between Threat Emulation and Threat Extraction here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1) Threat Extraction does not have a cache&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If a file should be extracted by policy it will always be extracted. Even if the same file arrives later on the extraction process will run again (it only takes a few seconds). The 14 days default storage option in the GUI is for the "original files". So if you get a Threat Extracted file you have 14 days to use the "get original file" option to retrieve the original file from the gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) Threat Emulation has a cache&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Threat Emulation has a local cache (gateways and emulators). You can check the content of the cache by running&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;[Expert@R7730Cloud:0]# tecli cache dump all&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;Images Uid List&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;===============&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|sha1 |file type |image |verdict |confidence|severity |date |hits |ttl |comment&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|----------------------------------------|----------|------------------------------|----------|----------|----------|----------|-----|----------|----------------------------------------&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|5b03ccec77b416805d6d8e270d33942aaedcc6dd|pdf |Win7,Office 2013,Adobe 11 |benign |None |None |5-7-2018 |1 |5-14-2018 |&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|5b03ccec77b416805d6d8e270d33942aaedcc6dd|pdf |WinXP,Office 2003/7,Adobe 9 |benign |None |None |5-7-2018 |1 |5-14-2018 |&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|1f25f4840b104a503cfe5c7f7b6b4a30e09002cb|pdf |Win7,Office 2013,Adobe 11 |benign |None |None |5-7-2018 |1 |5-14-2018 |&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;|1f25f4840b104a503cfe5c7f7b6b4a30e09002cb|pdf |WinXP,Office 2003/7,Adobe 9 |benign |None |None |5-7-2018 |1 |5-14-2018 |&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also manipulate the cache via some&lt;EM&gt; # tecli cache&lt;/EM&gt; .... commands.&lt;/P&gt;&lt;P&gt;Check out this great SK for a full reference of "tecli cache":&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806#tecli%20cache" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806#tecli%20cache"&gt;ATRG: Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This cache is queried each time a new file arrives. If the SHA1 is found in the cache the related verdict and actions will be immediately taken without re-remulating the file (this improves performance and throughput). You can check the cache hit rate via&lt;EM&gt; # tecli show statistics&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;[Expert@R7730Cloud:0]# tecli s s&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt; Last day Last week Last 30 days&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;General Information:&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;--------------------&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;Scanned files: 0 0 0&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;Malicious files: 0 0 0&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;Files filtered by static analysis: 0 0 0&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM&gt;Files error count: 0 0 0&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12px;"&gt;&lt;EM style="color: #ffcc00;"&gt;Files filtered by local cache: 0 0 0&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default cache live time for an entry is 7 days - meaning if the same SHA1 hash is not seen for more than seven days the entry will be removed from cache. Each time the entry will be seen again the cache life time is extended by 7 days. The cache life time (TTL) can also be manipulated via&lt;EM&gt; # tecli cache ttl ..&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Thomas&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 11:59:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29829#M13847</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2018-06-18T11:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: Files on Threat Emulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29830#M13848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for answer, now is clear!&lt;/P&gt;&lt;P&gt;Giancarlo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 19:16:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Files-on-Threat-Emulation/m-p/29830#M13848</guid>
      <dc:creator>Giancarlo_Cotta</dc:creator>
      <dc:date>2018-06-18T19:16:35Z</dc:date>
    </item>
  </channel>
</rss>

