<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Malicious file sent through Sandblast in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12679#M14116</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: I have removed the attachment to the original post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vbs files are only emulated when received via email (i.e.&amp;nbsp;when SandBlast is configured as an MTA).&lt;/P&gt;&lt;P&gt;When they are received via HTTP/HTTPS, they are not emulated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is&amp;nbsp;documented here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106123" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106123"&gt;File types supported by SandBlast Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Nov 2017 16:40:51 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2017-11-17T16:40:51Z</dc:date>
    <item>
      <title>Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12678#M14115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello !&lt;/P&gt;&lt;P&gt;Customer was able to send the attached file through sandblast with AV/TE/TEX enabled ...&lt;/P&gt;&lt;P&gt;if the file is renamed to .7z - it turns to be a password-protected archive (passwd:&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 13.3333px;"&gt;TestCase02) with vbs script ...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 13.3333px;"&gt;What have we done wrong ?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 12:14:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12678#M14115</guid>
      <dc:creator>Nikolajs_Matjus</dc:creator>
      <dc:date>2017-11-17T12:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12679#M14116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: I have removed the attachment to the original post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vbs files are only emulated when received via email (i.e.&amp;nbsp;when SandBlast is configured as an MTA).&lt;/P&gt;&lt;P&gt;When they are received via HTTP/HTTPS, they are not emulated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is&amp;nbsp;documented here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106123" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106123"&gt;File types supported by SandBlast Threat Emulation&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 16:40:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12679#M14116</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-11-17T16:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12680#M14117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the policy on password encrypted files?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2017 08:45:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12680#M14117</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-20T08:45:20Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12681#M14118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For this site? I removed the file because it contains malware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;How Threat&amp;nbsp;Extraction handles them? It depends on your profile setting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61002_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2017 16:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12681#M14118</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-11-20T16:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12682#M14119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi !&lt;/P&gt;&lt;P&gt;The policy is to block encrypted file attachments.&lt;/P&gt;&lt;P&gt;However this file has passed through TE/TEX and user can download original file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2017 18:17:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12682#M14119</guid>
      <dc:creator>Nikolajs_Matjus</dc:creator>
      <dc:date>2017-11-20T18:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12683#M14120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the original file was an archive (I can´t see it from your post only) it is currently not supported with TX hence your "Encrypted content block" TX feature does not apply. Archive support for TX is on the roadmap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That said if received via email it should have been emulated and catched by TE as Daemon already mentioned.&lt;/P&gt;&lt;P&gt;If this was not the case please open a support ticket with your information.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Nov 2017 20:54:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12683#M14120</guid>
      <dc:creator>Thomas_Werner</dc:creator>
      <dc:date>2017-11-26T20:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Malicious file sent through Sandblast</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12684#M14121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nikolajs,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify the rename to .7z remark in your question. Were you using another extension on the file and was that sufficient to bypass TE/TEX?&lt;/P&gt;&lt;P&gt;Please think of us of people who know nothing about your setup (which is true) and describe the steps to reproduce this exactly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 08:00:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Malicious-file-sent-through-Sandblast/m-p/12684#M14121</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2017-11-27T08:00:19Z</dc:date>
    </item>
  </channel>
</rss>

