<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sandblast Emulation/Extraction work? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Emulation-Extraction-work/m-p/131866#M19487</link>
    <description>&lt;P&gt;Scenarios:&lt;/P&gt;&lt;P&gt;Gateway Enable threat emulation/extraction&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat extraction:&lt;/STRONG&gt; I knew that threat extraction proactive removed malicious content on file and ensure file delivery to user safe content&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat Emulation: &lt;/STRONG&gt;when gateway received unknown file send to the cloud to run on virtual sandboxing cloud&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1) During the step gateway send the unknown file to the cloud does the gateway keep the unknown file on its own firewall? if it keeps the unknown file on its own firewall where is the location store the unknown file in?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) C&lt;/STRONG&gt;an we monitor the progress of the file during gateway send to the cloud?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 16 Oct 2021 06:09:59 GMT</pubDate>
    <dc:creator>leangm</dc:creator>
    <dc:date>2021-10-16T06:09:59Z</dc:date>
    <item>
      <title>Sandblast Emulation/Extraction work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Emulation-Extraction-work/m-p/131866#M19487</link>
      <description>&lt;P&gt;Scenarios:&lt;/P&gt;&lt;P&gt;Gateway Enable threat emulation/extraction&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat extraction:&lt;/STRONG&gt; I knew that threat extraction proactive removed malicious content on file and ensure file delivery to user safe content&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Threat Emulation: &lt;/STRONG&gt;when gateway received unknown file send to the cloud to run on virtual sandboxing cloud&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My question&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1) During the step gateway send the unknown file to the cloud does the gateway keep the unknown file on its own firewall? if it keeps the unknown file on its own firewall where is the location store the unknown file in?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2) C&lt;/STRONG&gt;an we monitor the progress of the file during gateway send to the cloud?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 06:09:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Emulation-Extraction-work/m-p/131866#M19487</guid>
      <dc:creator>leangm</dc:creator>
      <dc:date>2021-10-16T06:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Sandblast Emulation/Extraction work?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Emulation-Extraction-work/m-p/131925#M19501</link>
      <description>&lt;P&gt;You should be able to retrieve the original file by fileid (found in the log card) using the command&amp;nbsp;&lt;SPAN&gt;scrub send_orig_file.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Actually, what's happening in many cases is the URL where the file is coming from is sent to the cloud and the cloud retrieves the file directly.&amp;nbsp;&lt;BR /&gt;In other cases (e.g MTA) the file is being uploaded from the gateway.&lt;BR /&gt;Believe you can monitor with tecli on the gateway.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806&amp;amp;partition=Advanced&amp;amp;product=Threat" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806&amp;amp;partition=Advanced&amp;amp;product=Threat&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 03:49:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Sandblast-Emulation-Extraction-work/m-p/131925#M19501</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-18T03:49:31Z</dc:date>
    </item>
  </channel>
</rss>

