<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Emulation and Threat Extraction testing resources in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266890#M53553</link>
    <description>&lt;P&gt;Another point.&lt;/P&gt;
&lt;P&gt;It is &lt;A href="http://checkme.checkpoint.com" target="_blank"&gt;http://checkme.checkpoint.com&lt;/A&gt;&amp;nbsp;and not cpcheckme....&amp;nbsp; All part of the makeover....&lt;/P&gt;
&lt;P&gt;Right now it is http (as above) and NOT https.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not at all confusing..&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jan 2026 12:29:31 GMT</pubDate>
    <dc:creator>Don_Paterson</dc:creator>
    <dc:date>2026-01-09T12:29:31Z</dc:date>
    <item>
      <title>Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266840#M53545</link>
      <description>&lt;P&gt;Is there a documented public&amp;nbsp;test/procedure that can be used to test the TE and TEX blades?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am thinking a site hosting testing files (benign) that will generate logs. Meaning that the blades will work with the files downloaded through the gateway, emulating and scrubbing.&lt;/P&gt;
&lt;P&gt;Also useful/favourite commands, e.g.&lt;/P&gt;
&lt;P&gt;cpview&lt;/P&gt;
&lt;P&gt;tecli show statistics&lt;/P&gt;
&lt;P&gt;cpstat threat-emulation -f general_statuses&lt;/P&gt;
&lt;P&gt;cpstat threat-emulation -f contract&lt;/P&gt;
&lt;P&gt;tecli show cloud quota&lt;/P&gt;
&lt;P&gt;nslookup -query=SRV te.checkpoint.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:&lt;/P&gt;
&lt;P&gt;Please do not suggest CPCHECKME&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2026 20:58:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266840#M53545</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-08T20:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266850#M53546</link>
      <description>&lt;P&gt;This will be a challenge. There are some ''fake'' test virus out there like&amp;nbsp;&lt;SPAN&gt;EICAR. But all vendors are already aware. I would build something in vmware, isolate it from the rest and use this as a test case to download and receive e-mails. EICAR you can send as attachment, then atleast you know you configured the basics correctly. If it arrives at the client you know something is up. Not sure if the e-mail provider will send it tho.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Or what do you think something like this?&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-office-365/attack-simulation-training-simulations?view=o365-worldwide" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-office-365/attack-simulation-training-simulations?view=o365-worldwide&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2026 21:51:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266850#M53546</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2026-01-08T21:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266856#M53547</link>
      <description>&lt;P&gt;Excellent post, Don. Im not personally aware of any other site, other than eicar, but would be awesome if this could be tested.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jan 2026 23:44:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266856#M53547</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-08T23:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266858#M53548</link>
      <description>&lt;P&gt;I usually test in lab using a test Word file (demo.doc) that was available when there was a test link for Threat Emulation in ThreatWiki. Does any one remember it?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thinking_face:"&gt;🤔&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;I'm still wondering why the test link was removed from the site...&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 00:48:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266858#M53548</guid>
      <dc:creator>Tom_Hinoue</dc:creator>
      <dc:date>2026-01-09T00:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266859#M53549</link>
      <description>&lt;P&gt;O yea, thats right, I remember that.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 00:50:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266859#M53549</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-09T00:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266880#M53550</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/73547"&gt;@Lesley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think that is more about testing Microsoft Defender security.&lt;/P&gt;
&lt;P&gt;It would be nice to have an official test procedure (plus resources) that Check Point documents and maintains (outside of PoC and Partner demo (DemoPoint) tools).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have found these two links and done minimal testing.&lt;/P&gt;
&lt;P&gt;The results are good because they show that TE is working and scanning files. It finds malware and logs it, and it is not a Check Point associated repo (added bonus in this case).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/rakeshcorp/sandbox-samples/tree/master/anti-vm" target="_blank"&gt;https://github.com/rakeshcorp/sandbox-samples/tree/master/anti-vm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/ytisf/theZoo" target="_blank"&gt;https://github.com/ytisf/theZoo&lt;/A&gt; - Use carefully, lab only&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Time permitting I will look into this some more and see what can be used and added in here.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 09:32:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266880#M53550</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-09T09:32:27Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266886#M53551</link>
      <description>&lt;P&gt;I'm checking current accessibility but cpcheckme previously assisted in this regard.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 12:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266886#M53551</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2026-01-09T12:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266889#M53552</link>
      <description>&lt;P&gt;Thanks Chris.&lt;/P&gt;
&lt;P&gt;But that is in my avoid list.&lt;/P&gt;
&lt;P&gt;CPCHECKME underwent the big makeover last year and it changed the way it worked (end user experience).&lt;/P&gt;
&lt;P&gt;Also broke the CTPS course lab steps that used it before.&lt;/P&gt;
&lt;P&gt;Long story short. I always had problems with it and had to use Firefox to be sure it would work. Then it got a facelist and because it is a Marketing department tool the message was - too bad, don't use it in labs.&lt;/P&gt;
&lt;P&gt;That's my honest view. So I am looking for more valid technical testing tools.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 12:24:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266889#M53552</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-09T12:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266890#M53553</link>
      <description>&lt;P&gt;Another point.&lt;/P&gt;
&lt;P&gt;It is &lt;A href="http://checkme.checkpoint.com" target="_blank"&gt;http://checkme.checkpoint.com&lt;/A&gt;&amp;nbsp;and not cpcheckme....&amp;nbsp; All part of the makeover....&lt;/P&gt;
&lt;P&gt;Right now it is http (as above) and NOT https.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Not at all confusing..&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 12:29:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266890#M53553</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-09T12:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266892#M53554</link>
      <description>&lt;P&gt;That note I added to not suggest CPCHECKME/CHECKME was to avoid this noise.&lt;/P&gt;
&lt;P&gt;I just ran it and it triggers IPS, AV and AB but not TE and TEX.&lt;/P&gt;
&lt;P&gt;That made it great for CTPS course labs because those first three blades are covered in that course.&lt;/P&gt;
&lt;P&gt;Putting the training aside, the real-world testing would want to cover all the blades and offer a few examples of each.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 12:44:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266892#M53554</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-09T12:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation and Threat Extraction testing resources</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266893#M53555</link>
      <description>&lt;P&gt;The &lt;STRONG&gt;Endpoint&lt;/STRONG&gt; executable download test triggers TE on the gateway but it was the Endpoint test and not the &lt;STRONG&gt;Network&lt;/STRONG&gt; test..&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jan 2026 12:41:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Threat-Emulation-and-Threat-Extraction-testing-resources/m-p/266893#M53555</guid>
      <dc:creator>Don_Paterson</dc:creator>
      <dc:date>2026-01-09T12:41:14Z</dc:date>
    </item>
  </channel>
</rss>

