<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction? in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6500#M565</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the response. This is much appreciated.&lt;/P&gt;&lt;P&gt;We are planning to enable Threat Extraction on our Gateways. We are running two 4800s on R77.30 and a smart1-205 Management.&lt;/P&gt;&lt;P&gt;I hope the specifications of my current devices will be able to support Threat Extraction without a diverse impact&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Sep 2017 14:34:27 GMT</pubDate>
    <dc:creator>Daniel_Ndiba</dc:creator>
    <dc:date>2017-09-27T14:34:27Z</dc:date>
    <item>
      <title>What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6497#M562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Sep 2017 13:56:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6497#M562</guid>
      <dc:creator>Daniel_Ndiba</dc:creator>
      <dc:date>2017-09-22T13:56:49Z</dc:date>
    </item>
    <item>
      <title>Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6498#M563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://www.checkpoint.com/downloads/product-related/datasheets/DS_Threat_Extraction.pdf"&gt;Threat Extraction Datasheet&lt;/A&gt; &amp;amp; &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101553"&gt;Technology&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108553"&gt;Mail Transfer Agent (MTA) - FAQ&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk120260"&gt;MTA Debugging and Performance Troubleshooting Toolkit&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2015/09/22/closing-the-malware-gap-the-rise-of-threat-extraction/"&gt;Closing the Malware Gap: The Rise of Threat Extraction&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;STRONG&gt;&lt;A href="https://www.checkpoint.com/products/threat-extraction/"&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;SandBlast Threat Extraction&lt;/SPAN&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;&amp;nbsp;removes exploitable content, including active content and embedded objects, reconstructs files to eliminate potential threats, and promptly delivers sanitized content to users to maintain business flow. It is a new technology that removes potentially malicious features that are known to be risky from files (macros, embedded objects and more - see list below).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;This is a new approach for Threat Prevention: instead of determining whether a file is malicious or not, Threat Extraction cleans the file &lt;/SPAN&gt;&lt;SPAN style="; font-size: medium; font-family: sans-serif;"&gt;&lt;EM&gt;before&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt; it enters the organization. Threat Extraction prevents both known and unknown threats &lt;/SPAN&gt;&lt;SPAN style="; font-size: medium; font-family: sans-serif;"&gt;&lt;EM&gt;before&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt; they arrive to the organization, thus providing better protection against zero-day threats.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="; font-size: medium; font-family: sans-serif;"&gt;&lt;STRONG&gt;Supported file formats&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;Threat Extraction supports the following primary file formats. Many other formats (such as Windows Metafile) that are commonly associated with these primary formats are also supported.&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE cellpadding="4" cellspacing="0" width="542"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="border-top: 1px double #808080; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0.11cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Format&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px double #808080; padding: 0.11cm;" width="275"&gt;&lt;P&gt;Extensions&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Adobe FDF&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;fdf&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Adobe PDF (all versions)&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;pdf&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Docfile&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;Microsoft Visio, Microsoft Project, etc.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Excel 2007 and above&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;xlsx, xlsb, xlsm, xltx, xltm, xlam&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Excel 2007 Binary&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;xlsb&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Excel 97 - 2003&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;xls&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft PowerPoint 2007 and above&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;pptx, pptm, potx, potm, ppam, ppsx, ppsm&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft PowerPoint 97 - 2003&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;ppt, pps, pot, ppa&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Word 2007 and above&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;docx, docm, dotx, dotm&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: none; padding: 0cm 0cm 0.11cm 0.11cm;" width="250"&gt;&lt;P&gt;Microsoft Word 97 - 2003&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-top: none; border-bottom: 1px double #808080; border-left: 1px double #808080; border-right: 1px double #808080; padding: 0cm 0.11cm 0.11cm 0.11cm;" width="275"&gt;&lt;P&gt;doc, dot&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="; font-size: medium; font-family: sans-serif;"&gt;&lt;STRONG&gt;Impact&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The performance impact on your gateways will hardly be noticable when simply &lt;SPAN style="text-decoration: underline;"&gt;extracting potentially malicious file contents&lt;/SPAN&gt;. As always with automated file content modifications this can result and unreadable characters or file names causing to end users to request having the original email attachment released to them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's a different story when converting all files into PDF. Of course this option will provide your end users with the most secure and trustworthy email attachments. However, PDFs are not really editable and many end users will complain that they cannot fill out an Excel sheet as meant by the sender of the email and sometimes the PDF conversions renders the resulting file almost unreadable. You need to educate your end users to be aware of these symptoms and provide them with a link within the email to that they can retrieve the original email attachment themself.&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;SPAN style="; font-size: medium; font-family: sans-serif;"&gt;&lt;STRONG&gt;Related SK's:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk118353"&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;High CPU consumption due to urandom, or "Error: Threat Extraction is not responding" displayed &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112106"&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;When Threat Extraction converts a PDF file, the output PDF file has many layers that are rendered slowly or cover information in the document &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: 0cm;"&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk119173"&gt;&lt;SPAN style="font-size: medium; font-family: sans-serif;"&gt;Files are renamed by Threat Emulation and Threat Extraction with specific special characters in the file name &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2017 14:18:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6498#M563</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-09-25T14:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6499#M564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have a perfect reply for you and am curious if other people are seeing performance issues with MTA activated on a Gateway. &amp;nbsp;Three months ago I activated MTA/Threat Extraction, however I was able to dedicate hardware to use exclusively for MTA/TX because I was unsure of the performance hit on our main gateway. &amp;nbsp;In practice, MTA is great and has really cleaned up some email problems for us. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Sep 2017 17:23:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6499#M564</guid>
      <dc:creator>Gregory_Welch</dc:creator>
      <dc:date>2017-09-25T17:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6500#M565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the response. This is much appreciated.&lt;/P&gt;&lt;P&gt;We are planning to enable Threat Extraction on our Gateways. We are running two 4800s on R77.30 and a smart1-205 Management.&lt;/P&gt;&lt;P&gt;I hope the specifications of my current devices will be able to support Threat Extraction without a diverse impact&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 14:34:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6500#M565</guid>
      <dc:creator>Daniel_Ndiba</dc:creator>
      <dc:date>2017-09-27T14:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6501#M566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have two gateways running in cluster mode, the hardware you have dedicated for MTA/TX is one of your gateways right, or how is the deployment?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Sep 2017 14:37:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6501#M566</guid>
      <dc:creator>Daniel_Ndiba</dc:creator>
      <dc:date>2017-09-27T14:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: What is the impact(performance wise and other aspects) of setting Checkpoint as an MTA so as to utilize Threat Extraction?</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6502#M567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The MTA function is implemented in process space on the gateway, so just make sure the gateway cores are not extremely busy in kernel space (sy/si/hi) to avoid the MTA processes having to wait a long time for the CPU.&amp;nbsp; Even if there are delays caused by this, the users don't tend to notice their email getting delayed for a few seconds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Nov 2017 14:14:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/What-is-the-impact-performance-wise-and-other-aspects-of-setting/m-p/6502#M567</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-11-10T14:14:37Z</dc:date>
    </item>
  </channel>
</rss>

