<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identify Threat Emulation Event - Details in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185102#M7188</link>
    <description>&lt;P&gt;Hello tech´s,&lt;/P&gt;&lt;P&gt;I can regulary see these events:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Events.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21561iA73B0F9C34D49C8F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Events.png" alt="Events.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the details I see that the Threat Emulation is doing fine and all malicious files have been droppt.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="details.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21562iCB324C201CD1E7CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="details.png" alt="details.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But I am more than interested of knowing where the emulation has been initiated from to inspect this specific device deeper.&amp;nbsp;&lt;BR /&gt;I spent already some time in that but cannot find more information on that.&lt;BR /&gt;&lt;BR /&gt;Hope my case is clear.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Oliver&lt;/P&gt;</description>
    <pubDate>Wed, 28 Jun 2023 20:54:57 GMT</pubDate>
    <dc:creator>CP-Shark</dc:creator>
    <dc:date>2023-06-28T20:54:57Z</dc:date>
    <item>
      <title>Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185102#M7188</link>
      <description>&lt;P&gt;Hello tech´s,&lt;/P&gt;&lt;P&gt;I can regulary see these events:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Events.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21561iA73B0F9C34D49C8F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Events.png" alt="Events.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the details I see that the Threat Emulation is doing fine and all malicious files have been droppt.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="details.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21562iCB324C201CD1E7CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="details.png" alt="details.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But I am more than interested of knowing where the emulation has been initiated from to inspect this specific device deeper.&amp;nbsp;&lt;BR /&gt;I spent already some time in that but cannot find more information on that.&lt;BR /&gt;&lt;BR /&gt;Hope my case is clear.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Oliver&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 20:54:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185102#M7188</guid>
      <dc:creator>CP-Shark</dc:creator>
      <dc:date>2023-06-28T20:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185122#M7189</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"API Emulation" implies another system / product (e.g. Browser extension) is submitting the files for evaluation so there will likely be details there to review.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;But to start I would suggest reviewing the forensic report for more information if you've not already?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In the log window, under &lt;EM&gt;&lt;STRONG&gt;Forensic Details&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;refer to the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Vulnerable Operating Systems&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;row - click on the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;link.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the browser extension is used verify the logging options are set per:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk108695" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk108695&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk171179" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk171179&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Note: The Log is "Detect" not "Prevent" and the reference to dropped files is not in this context hence further investigation is warranted.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2023 00:52:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185122#M7189</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-06-30T00:52:51Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185145#M7190</link>
      <description>&lt;P&gt;Hello Chris,&lt;BR /&gt;&lt;BR /&gt;thank you for getting in touch on this.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;In the log window, under&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;Forensic Details&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;refer to the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Vulnerable Operating Systems&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;row - click on the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Summary&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;link.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-&amp;gt; I can see what happened on the emulated OS incl. the Emulation Video. but I cannot identify from which client the emulation came from.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If the browser extension is used verify the logging options are set per:&lt;/P&gt;&lt;P&gt;-&amp;gt; I´ve checked the log settings in the registry and all&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2023-06-29 10_28_24-Window.png" style="width: 331px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21569i53828398B9A57C49/image-size/large?v=v2&amp;amp;px=999" role="button" title="2023-06-29 10_28_24-Window.png" alt="2023-06-29 10_28_24-Window.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 08:34:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185145#M7190</guid>
      <dc:creator>CP-Shark</dc:creator>
      <dc:date>2023-06-29T08:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185154#M7191</link>
      <description>&lt;P&gt;Did you check the corresponding gateway setting to receive them?&lt;/P&gt;
&lt;P&gt;What Endpoint client version is deployed and how is it managed?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 10:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185154#M7191</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-06-29T10:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185165#M7192</link>
      <description>&lt;P&gt;Could you provide more informations on your last post?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 13:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185165#M7192</guid>
      <dc:creator>CP-Shark</dc:creator>
      <dc:date>2023-06-29T13:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185168#M7193</link>
      <description>&lt;P&gt;The Endpoint solution is either cloud managed or On-Prem.&lt;/P&gt;
&lt;P&gt;Version wise is the client E86.80 or higher?&lt;/P&gt;
&lt;P&gt;The SK article with the logs_enabled parameter also states:&lt;/P&gt;
&lt;P&gt;The option needs to be enabled on the Security Gateway as well, logs_api_enabled needs to be set to TRUE under /opt/CPUserCheckPortal/phpincs/conf/TPAPI.ini&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For faster resolution perhaps a remote session with TAC would be helpful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 13:40:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185168#M7193</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-06-29T13:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185173#M7194</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;our entire environment is On-Prem including TE Appliance.&lt;/P&gt;&lt;P&gt;Version is E86.50. We have a few test clients running on E87.20 as well.&lt;/P&gt;&lt;P&gt;Security Gateway = TE Appliance or is that our Endpoint Management Server?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:04:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185173#M7194</guid>
      <dc:creator>CP-Shark</dc:creator>
      <dc:date>2023-06-29T14:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185174#M7195</link>
      <description>&lt;P&gt;TE appliance in this instance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(Though obviously also worthwhile reviewing your Endpoint logs for the same time period aswell)&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:13:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185174#M7195</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-06-29T14:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185178#M7196</link>
      <description>&lt;P&gt;Ok, I checked the&amp;nbsp;&lt;SPAN&gt;TPAPI.ini and the&amp;nbsp;logs_api_enabled was set to TRUE.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:28:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185178#M7196</guid>
      <dc:creator>CP-Shark</dc:creator>
      <dc:date>2023-06-29T14:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: Identify Threat Emulation Event - Details</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185179#M7197</link>
      <description>&lt;P&gt;OK Good. Please contact TAC to investigate further.&lt;/P&gt;
&lt;P&gt;Very conscious of the time spent here versus actually investigating the endpoint itself.&lt;/P&gt;
&lt;P&gt;With respect to that element note we do have an Incident Response service you can engage where needed.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:42:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Identify-Threat-Emulation-Event-Details/m-p/185179#M7197</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-06-29T14:42:21Z</dc:date>
    </item>
  </channel>
</rss>

