<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Email Threat Extraction - Allow and extracted anyways? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/204618#M54384</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;i just have issues in understanding how our Checkpoint NGFW handles mails sometimes. Were using the MTA function.&lt;/P&gt;&lt;P&gt;one of our employees received an email with the hint that sandblast has removed some contents. There are PDF files on that mail that gets missed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the firewall log. Usually i can recover the MAIL or the FILE by those IDs through the scrub send_orig commands&lt;/P&gt;&lt;P&gt;I found the mentioned mail with Action "Allow". Even though there is extracted content, seen in the screenshot.&lt;/P&gt;&lt;P&gt;Its now allowed, or not?&lt;/P&gt;&lt;P&gt;If i try to resend the mail through "scrub send_orig_email {mailid} all" the mail wont get received by the employee. I get the message "Original mail was sent to "employees mail" "&lt;/P&gt;&lt;P&gt;Where to have a further look for this now? Can i check if the Mail really is on hold?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 06:19:01 GMT</pubDate>
    <dc:creator>SWBW_Florian</dc:creator>
    <dc:date>2024-01-31T06:19:01Z</dc:date>
    <item>
      <title>Email Threat Extraction - Allow and extracted anyways?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/204618#M54384</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;i just have issues in understanding how our Checkpoint NGFW handles mails sometimes. Were using the MTA function.&lt;/P&gt;&lt;P&gt;one of our employees received an email with the hint that sandblast has removed some contents. There are PDF files on that mail that gets missed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked the firewall log. Usually i can recover the MAIL or the FILE by those IDs through the scrub send_orig commands&lt;/P&gt;&lt;P&gt;I found the mentioned mail with Action "Allow". Even though there is extracted content, seen in the screenshot.&lt;/P&gt;&lt;P&gt;Its now allowed, or not?&lt;/P&gt;&lt;P&gt;If i try to resend the mail through "scrub send_orig_email {mailid} all" the mail wont get received by the employee. I get the message "Original mail was sent to "employees mail" "&lt;/P&gt;&lt;P&gt;Where to have a further look for this now? Can i check if the Mail really is on hold?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 06:19:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/204618#M54384</guid>
      <dc:creator>SWBW_Florian</dc:creator>
      <dc:date>2024-01-31T06:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Email Threat Extraction - Allow and extracted anyways?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/205527#M54385</link>
      <description>&lt;P&gt;I'd start by checking the ATRG for Threat Extraction, which includes some debug steps:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk114807" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk114807&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 23:04:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/205527#M54385</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-08T23:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: Email Threat Extraction - Allow and extracted anyways?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/207692#M54386</link>
      <description>&lt;P&gt;thanks phoneboy&lt;/P&gt;&lt;P&gt;i will try to work through that&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2024 06:15:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Email-Threat-Extraction-Allow-and-extracted-anyways/m-p/207692#M54386</guid>
      <dc:creator>SWBW_Florian</dc:creator>
      <dc:date>2024-03-04T06:15:50Z</dc:date>
    </item>
  </channel>
</rss>

