<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Emulation   - Extend SNMP with Shell script Faulty in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205523#M34106</link>
    <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;You might try debugging snmpd:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk56783" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk56783&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 22:25:01 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-02-08T22:25:01Z</dc:date>
    <item>
      <title>Threat Emulation   - Extend SNMP with Shell script Faulty</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205440#M34092</link>
      <description>&lt;P&gt;Hi!&lt;BR /&gt;&lt;BR /&gt;I'm running an ON-prem security gateway that Is connected to a cloud Sandbox. I want to take out Threat Emulation statistics and send over to monitoring system.&lt;BR /&gt;&lt;BR /&gt;Followed along this guide,&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk114806" target="_blank"&gt;ATRG: Threat Emulation (checkpoint.com)&lt;/A&gt;&lt;BR /&gt;"Follow the following action plan (for detailed instructions, refer to&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90860#Advanced%20SNMP%20configuration%20-%20Extend%20SNMP" target="_blank" rel="noopener"&gt;sk90860 - How to configure SNMP on Gaia OS&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- section "(IV-6) Advanced SNMP configuration - Extend SNMP with shell script"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The main goal is to monitor this OID,&lt;BR /&gt;.1.3.6.1.4.1.2620.1.49.5.1&lt;/P&gt;&lt;P&gt;"TE Malware Detected"&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;1. So I've enabled SNMP Agent in GAIA, version v3 only. Created a snmpuser with an authpriv, privacy protocol AES256 and authentication protocol SHA256.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;2. Created a basic shell script that I put under under /home/admin/test.sh.&lt;BR /&gt;# Extract amount of malicious code&lt;BR /&gt;#!/bin/bash&lt;BR /&gt;. /opt/CPshared/5.0/tmp/.CPprofile.sh&lt;BR /&gt;cpstat threat-emulation -f malware_detected&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;3. Disable the SNMP agent&lt;BR /&gt;&lt;BR /&gt;4. Added this line under /etc/snmp/userDefinedSettings.conf&lt;BR /&gt;"extend&amp;nbsp;.1.3.6.1.4.1.2620.1.49.5.1 test /bin/sh /home/admin/test.sh"&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;5. Re-Enabled the SNMP agent&lt;/P&gt;&lt;P&gt;6. Here comes the problem, I'm unable to test the OID. Tried with these commands, but It's not working.&lt;BR /&gt;&lt;BR /&gt;snmpwalk -v 2c -c test localhost .1.3.6.1.4.1.2620.1.49.5.1&lt;BR /&gt;&lt;STRONG&gt;"Timeout: No Response from localhost"&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;snmpwalk -v 3 -c test localhost .1.3.6.1.4.1.2620.1.49.5.1&lt;BR /&gt;&lt;STRONG&gt;"snmpwalk: Timeout"&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;Have anyone else experienced the same problem?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 09:24:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205440#M34092</guid>
      <dc:creator>Forsaken_61</dc:creator>
      <dc:date>2024-02-08T09:24:03Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation   - Extend SNMP with Shell script Faulty</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205523#M34106</link>
      <description>&lt;P&gt;What version/JHF?&lt;BR /&gt;You might try debugging snmpd:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk56783" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk56783&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 22:25:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205523#M34106</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-08T22:25:01Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation   - Extend SNMP with Shell script Faulty</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205556#M34112</link>
      <description>&lt;P&gt;I'm running on R81_20_JUMBO_HF_MAIN Take: 26&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 08:24:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205556#M34112</guid>
      <dc:creator>Forsaken_61</dc:creator>
      <dc:date>2024-02-09T08:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation   - Extend SNMP with Shell script Faulty</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205632#M34128</link>
      <description>&lt;P&gt;And have you debugged snmpd?&lt;BR /&gt;There are some SNMP-related fixes in Take 43, but not sure they are relevant here.&lt;BR /&gt;This is probably going to involve a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 01:33:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Threat-Emulation-Extend-SNMP-with-Shell-script-Faulty/m-p/205632#M34128</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-02-10T01:33:24Z</dc:date>
    </item>
  </channel>
</rss>

