<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MTA Threat Extraction / Emulation Workflow ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23269#M58487</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest the following documents:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108553&amp;amp;partition=General&amp;amp;product=Mail"&gt;Mail Transfer Agent (MTA) - FAQ&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109699&amp;amp;partition=Advanced&amp;amp;product=Mail"&gt;sk109699 ATRG: Mail Transfer Agent (MTA)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120260&amp;amp;partition=Advanced&amp;amp;product=Mail"&gt;sk120260 MTA Debugging and Performance Troubleshooting Toolkit&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But of course, there is much more &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/plain.png" /&gt;&amp;nbsp;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Aug 2018 11:18:36 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2018-08-29T11:18:36Z</dc:date>
    <item>
      <title>MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23268#M58486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I was looking for documentation about the workflow about the Threat Extraction and Emulation when used with MTA and couldn't find it.&lt;/P&gt;&lt;P&gt;So when an E-Mail arrives, what will be done first and what exactly will then be processed etc.&lt;/P&gt;&lt;P&gt;A visible workflow would help to understand how the System processes incoming E-Mails.&lt;/P&gt;&lt;P&gt;So what happens if we already have a file in the Cache, what happened with the Reputation of an Attachement and how is the verdict decision done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be helpful if someone has any links or documents to answer this...&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 09:14:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23268#M58486</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-08-29T09:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23269#M58487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would suggest the following documents:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108553&amp;amp;partition=General&amp;amp;product=Mail"&gt;Mail Transfer Agent (MTA) - FAQ&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109699&amp;amp;partition=Advanced&amp;amp;product=Mail"&gt;sk109699 ATRG: Mail Transfer Agent (MTA)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk120260&amp;amp;partition=Advanced&amp;amp;product=Mail"&gt;sk120260 MTA Debugging and Performance Troubleshooting Toolkit&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But of course, there is much more &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/plain.png" /&gt;&amp;nbsp;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 11:18:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23269#M58487</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-08-29T11:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23270#M58488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Günther,&lt;/P&gt;&lt;P&gt;Thanks for your reply and links, very interesting but only focused on the MTA Flow.&lt;/P&gt;&lt;P&gt;What I need is an overview what exactly is Happening when the E-Mail is arriving at the Threat Emulation / Extraction.&lt;/P&gt;&lt;P&gt;So as example: Incoming E-Mail - links in Body? - yes: do Threat Emulation - Malicious links included? - yes: Threat Emulation of the links or for Threat Extraction: Incoming E-Mail - is filetype active? - yes: Threat Extraction according Settings - verdict decision?&amp;nbsp;etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A complete overview what exactly is Happening would&amp;nbsp;answer the customers question how an E-Mail is exactly proceeded...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 11:28:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23270#M58488</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-08-29T11:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23271#M58489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you must consult &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806&amp;amp;partition=Advanced&amp;amp;product=Threat#Emulation%20Workflow"&gt;sk114806 ATRG: Threat Emulation&lt;/A&gt;&amp;nbsp;- as you did study the Threat Prevention Administration Guide R80.10 already...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 12:19:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23271#M58489</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-08-29T12:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23272#M58490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Günther,&lt;/P&gt;&lt;P&gt;Interesting document, &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114806&amp;amp;partition=Advanced&amp;amp;product=Threat#Emulation Workflow"&gt;(7) Emulation Workflow&lt;/A&gt;&amp;nbsp;does give&amp;nbsp;the needed&amp;nbsp;Information about the workflow.&lt;/P&gt;&lt;P&gt;I'm still searching now the doc for Threat Extraction...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 14:38:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23272#M58490</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-08-29T14:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23273#M58491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A _jive_internal="true" data-userid="47724" data-username="peter8e794fa0-320c-404b-9877-111ee115997c" href="https://community.checkpoint.com/people/peter8e794fa0-320c-404b-9877-111ee115997c"&gt;Peter,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recently wrote a document that gives an overview of content inspection. It's not exactly what you're looking for. But maybe this will help you to understand how content inspection works. But I still have to finish the MTA part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3073"&gt;R80.x Security Gateway Architecture (Content Inspection)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;This document describes the content inspection in a Check Point R80.10 and above gateways. Context Management Infrastructure (CMI) is the "brain" of the content inspection and use more different modules (CMI Loader, PSL vs. PXL, Protocol Parsers, Pattern Matcher, Protections and new in R80.10 &lt;SPAN style="color: black;"&gt;NGTP Architecture) for content inspection.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3041"&gt;R80.x Security Gateway Architecture (Logical Packet Flow)&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;This document describes the packet flow (partly also connection flows) in a Check Point &lt;STRONG&gt;R80.10 and above&lt;/STRONG&gt; with SecureXL and CoreXL, Content Inspection, Stateful inspection, network and port address translation (NAT), MultiCore Virtual Private Network (VPN) functions and forwarding are applied per-packet on the inbound and outbound interfaces of the device. There should be an overview of the basic technologies of a Check Point Firewall. We have also reworked the document several times with Check Point, so that it is now finally available.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: black; font-size: 15px;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/55229"&gt;Heiko&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 18:55:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23273#M58491</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-08-29T18:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23274#M58492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thre is only &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101553&amp;amp;partition=General&amp;amp;product=Threat"&gt;sk101553 Check Point Document Threat Extraction Technology &lt;/A&gt;afaik.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Aug 2018 07:09:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23274#M58492</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-08-30T07:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23275#M58493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/54411"&gt;Heiko Ankenbrand&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;Thank you very much fpr your feedbacks, I appreciate it!&lt;/P&gt;&lt;P&gt;Heiko's documents are great, with all the peacec of information I think I can construct an answer for this question.&lt;/P&gt;&lt;P&gt;It would be great if check point would create such a documentation about this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Sep 2018 08:41:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23275#M58493</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-09-04T08:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23276#M58494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again,&lt;/P&gt;&lt;P&gt;According to the customer sometimes an incoming mail is NOT sent to Emulation AND Extraction.&lt;/P&gt;&lt;P&gt;I did some tests today and it seems really a strange behavior.&lt;/P&gt;&lt;P&gt;For the test I sent 3 E-Mails, 1 with only *.zip (text files), 2 with only *.pdf, 3 with both *.zip (text files)&amp;nbsp;and *.pdf.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E-mail 1: Only Emulation is done according log.&lt;/P&gt;&lt;P&gt;E-Mail 2: Only Extraction is done according log.&lt;/P&gt;&lt;P&gt;E-Mail 3: Extraction and Emulation is done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to all the documents a receiving E-Mail should be sent to both Extraction AND Emulation.&lt;/P&gt;&lt;P&gt;So why do I not see this in the logs???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 08:55:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23276#M58494</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-09-05T08:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23277#M58495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That all depends on the configuration - according to document type, the&amp;nbsp;flow&amp;nbsp;can be&amp;nbsp;different, so&amp;nbsp;you can say nothing without knowing the detailed configuration of TE / TX !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 09:08:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23277#M58495</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-09-05T09:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23278#M58496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right!&lt;/P&gt;&lt;P&gt;That's why I was looking for a detailed workflow for it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 09:46:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23278#M58496</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2018-09-05T09:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: MTA Threat Extraction / Emulation Workflow ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23279#M58497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then have a good look into Threat Prevention Administration Guide R80.10 and you will find everything there &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Sep 2018 10:06:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/MTA-Threat-Extraction-Emulation-Workflow/m-p/23279#M58497</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-09-05T10:06:01Z</dc:date>
    </item>
  </channel>
</rss>

