<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Understanding Threat Emulation logs in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41015#M14034</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In a TE log you can find additional important information how a file was processed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64533" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64533_2018-04-11_11h10_21.png" style="width: 620px; height: 463px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the example above "trusted source" means that this file was bypassed by the global whitelist hence it was not emulated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Different values explained:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6; width: 50.8143%;"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH style="width: 16%;"&gt;Value&lt;/TH&gt;&lt;TH style="width: 31.8475%;"&gt;Comment&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;trusted source&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file bypassed emulation due to Check Point maintained and automatically updated TE whitelist&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;emulator&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was locally emulated on a SandBlast Appliance&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;cloud emulation&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was sent to cloud emulation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;remote emulation&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was sent to a remote SandBlast Appliance for emulation (this log is usually issued by a gateway connected to a SandBlast appliance)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;static analysis&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was pre-filtered by static analysis and was not emulated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;local cache&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file´s SHA1 was already found in cache (# tecli cache dump all) and was not emulated; action is based on the cached verdict&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;archive&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;handled file was an archive&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;logger&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;&lt;SPAN&gt;You get "logger" for a "malicious" file as verdict decider when the file was not successfully emulated but other advisories already convitced the file as malicious&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;file&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;&lt;SPAN&gt;When trying to emulate the file the actual file size was 0&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In depth info of e.g. static analyis, cache handling etc can be found in the amazing ATRG: Threat Emulation SK:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806"&gt;ATRG: Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this knowledge you can easily query all files that e.g. were really sent to cloud for emulation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64534" alt="" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64534_2018-04-11_11h43_00.png" style="width: 831px; height: 579px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With SmartLogs Timeline results you can even quickly check how file&amp;nbsp;amount was handled over a certain timeframe.&lt;/P&gt;&lt;P&gt;This is also helpful for investigating performance/throuput issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 11 Apr 2018 09:45:18 GMT</pubDate>
    <dc:creator>Thomas_Werner</dc:creator>
    <dc:date>2018-04-11T09:45:18Z</dc:date>
    <item>
      <title>Understanding Threat Emulation logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41015#M14034</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In a TE log you can find additional important information how a file was processed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64533" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64533_2018-04-11_11h10_21.png" style="width: 620px; height: 463px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the example above "trusted source" means that this file was bypassed by the global whitelist hence it was not emulated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Different values explained:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6; width: 50.8143%;"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH style="width: 16%;"&gt;Value&lt;/TH&gt;&lt;TH style="width: 31.8475%;"&gt;Comment&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;trusted source&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file bypassed emulation due to Check Point maintained and automatically updated TE whitelist&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;emulator&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was locally emulated on a SandBlast Appliance&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;cloud emulation&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was sent to cloud emulation&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;remote emulation&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was sent to a remote SandBlast Appliance for emulation (this log is usually issued by a gateway connected to a SandBlast appliance)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;static analysis&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file was pre-filtered by static analysis and was not emulated&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;local cache&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;file´s SHA1 was already found in cache (# tecli cache dump all) and was not emulated; action is based on the cached verdict&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;archive&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;handled file was an archive&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;logger&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;&lt;SPAN&gt;You get "logger" for a "malicious" file as verdict decider when the file was not successfully emulated but other advisories already convitced the file as malicious&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 16%;"&gt;&lt;STRONG&gt;file&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 31.8475%;"&gt;&lt;SPAN&gt;When trying to emulate the file the actual file size was 0&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In depth info of e.g. static analyis, cache handling etc can be found in the amazing ATRG: Threat Emulation SK:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806"&gt;ATRG: Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this knowledge you can easily query all files that e.g. were really sent to cloud for emulation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="64534" alt="" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64534_2018-04-11_11h43_00.png" style="width: 831px; height: 579px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With SmartLogs Timeline results you can even quickly check how file&amp;nbsp;amount was handled over a certain timeframe.&lt;/P&gt;&lt;P&gt;This is also helpful for investigating performance/throuput issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Apr 2018 09:45:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41015#M14034</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2018-04-11T09:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Threat Emulation logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41016#M14035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for explanation! But what does this output mean?&lt;/P&gt;&lt;P&gt;Win7,Office 2013,Adobe 11:logger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:47:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41016#M14035</guid>
      <dc:creator>Olga_Kuts</dc:creator>
      <dc:date>2018-08-01T12:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Threat Emulation logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41017#M14036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Olga,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good question &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We run several so called "investigators" in TE. One of them is "logger" - it is responsible for creating a summarized report when the verdict is "malicious".&lt;/P&gt;&lt;P&gt;The logger is then sending the log to the Mgmt. When the verdict "decider" is "logger" it means that the file arrived at the logger investigator with no previous conviction by TE.&lt;/P&gt;&lt;P&gt;This can happen when emulation is not possible due to an error in the emulation process. So usually this results also in an emulation error but if other advisories (besides the sandbox emulation) already convicted the file as malicious the logger changes the "error" verdict to "malicious".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as a summary:&lt;/P&gt;&lt;P&gt;You get "logger" for a "malicious" file as verdict decider when the file was not successfully emulated but other advisories already convicted the file as malicious.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Aug 2018 07:26:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/41017#M14036</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2018-08-07T07:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Threat Emulation logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/64356#M14037</link>
      <description>Dear Thomas,&lt;BR /&gt;&lt;BR /&gt;Regarding the value 'trusted source', is it possible to view the contents of the TE whitelist maintained by Check Point?&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Andre</description>
      <pubDate>Fri, 04 Oct 2019 11:08:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/64356#M14037</guid>
      <dc:creator>Andre_K</dc:creator>
      <dc:date>2019-10-04T11:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding Threat Emulation logs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/78708#M14038</link>
      <description>&lt;P&gt;What about logs with "policy" ? We found that too with r80.30 gateway.&lt;/P&gt;&lt;DIV class="page"&gt;&lt;DIV class="section"&gt;&lt;DIV class="layoutArea"&gt;&lt;DIV class="column"&gt;&lt;P&gt;&lt;SPAN&gt;Win10 64b,Office 2016,Adobe DC: policy. Win7,Office 2013,Adobe 11: policy.&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 18 Mar 2020 16:36:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-Threat-Emulation-logs/m-p/78708#M14038</guid>
      <dc:creator>felip3gustavo</dc:creator>
      <dc:date>2020-03-18T16:36:31Z</dc:date>
    </item>
  </channel>
</rss>

