<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Emulation Engine Update 7 in Chinese 中文</title>
    <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26163#M288</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2018/06/13/introducing-cadet-ai-technology-in-action/"&gt;https://blog.checkpoint.com/2018/06/13/introducing-cadet-ai-technology-in-action/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;這個先進的ML技術可大大強化TE對於未知惡意程式的模擬效率與準確度，也是Check Point結合AI用於資安防禦技術的開端! 相信接下來會有更多的AI應用於SandBlast/Threat Prevention中。&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Jun 2018 16:03:18 GMT</pubDate>
    <dc:creator>Danny_Yang</dc:creator>
    <dc:date>2018-06-18T16:03:18Z</dc:date>
    <item>
      <title>Threat Emulation Engine Update 7</title>
      <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26159#M284</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, 請留意目前最新的TE engine 7更新資訊。(版本: 57.99002577)&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk95235"&gt;sk95235 Threat Emulation Engine Update - What's New?&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;STRONG style=": ; color: #000000; text-decoration: underline; font-size: medium; font-family: Calibri;"&gt;What’s New:&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000; font-family: Calibri; font-size: medium;"&gt;CADET (Context-Aware&amp;nbsp;Detection and&amp;nbsp;Elimination of&amp;nbsp;Threats)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;CADET improves Threat Emulation precision by incorporating all existing Threat Emulation features in Machine Learning (ML) mode. ML is tuned to improve accuracy, increasing the number of threats detected and reducing the number of false positives. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&lt;EM&gt;Currently, CADET focuses on executable files, and applies only to cloud emulations&lt;/EM&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&lt;SPAN style="color: #ff0000;"&gt;Threat Prevention by file source URL.&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;Improved Static Macro analyzer. Improved detection of malicious macros in Office documents.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000; font-size: medium; font-family: Calibri;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;Improved executable file analysis performance by approximately 40%.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000; font-size: medium; font-family: Calibri;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&lt;SPAN style="color: #ff0000;"&gt;YARA for all file support – Early Availability&lt;/SPAN&gt;. This feature is currently off by default. To enable, see &lt;/SPAN&gt;&lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk123156"&gt;&lt;SPAN style="color: #0000ff; text-decoration: underline; font-size: medium; font-family: Calibri;"&gt;sk123156&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000; font-size: medium; font-family: Calibri;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: medium; font-family: Calibri;"&gt;New anti-evasion techniques. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #0000ff; font-size: medium; font-family: Calibri;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000; font-family: Calibri; font-size: medium;"&gt;Additional features in Threat Emulation reports:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: medium;"&gt;&lt;SPAN style="background: white; font-family: Calibri;"&gt;Added &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="background: white; font-family: 'Courier New';"&gt;tecli&lt;/SPAN&gt;&lt;SPAN style="background: white; font-family: Calibri;"&gt; command for configuring the malicious file password.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background: white; font-size: medium; font-family: Calibri;"&gt;Added HTTP attack vector which includes the download source URL and its reputation.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background: white; font-size: medium; font-family: Calibri;"&gt;Added time stamp to the attack vector. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background: white; font-size: medium; font-family: Calibri;"&gt;Added the option to download packet capture.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background: white; font-size: medium; font-family: Calibri;"&gt;Show the entire file path for archive/dropped/embedded descendants.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: 'Courier New';"&gt;o&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background: white; font-size: medium; font-family: Calibri;"&gt;Show emulation video instead of static screenshots.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.75in;"&gt;&lt;SPAN style="color: #000000; background: white; font-size: medium; font-family: Calibri;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt 0.5in; text-indent: -0.25in;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="font-size: medium; font-family: Symbol;"&gt;·&lt;/SPAN&gt;&lt;SPAN style="font-family: 'Times New Roman','serif'; font-size: 7pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;Improved Cloud Emulation queue wait time by approximately 50%.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;STRONG style=": ; color: #000000; background: white; font-size: medium; font-family: Calibri,Century Gothic;"&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: medium; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 04:02:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26159#M284</guid>
      <dc:creator>Danny_Yang</dc:creator>
      <dc:date>2018-05-25T04:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation Engine Update 7</title>
      <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26160#M285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;AI技術應用已經整合至TE Engine中了!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 04:04:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26160#M285</guid>
      <dc:creator>Danny_Yang</dc:creator>
      <dc:date>2018-05-25T04:04:43Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation Engine Update 7</title>
      <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26161#M286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;目前KB資訊尚未更新，後續可參考詳細說明。&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2018 04:05:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26161#M286</guid>
      <dc:creator>Danny_Yang</dc:creator>
      <dc:date>2018-05-25T04:05:44Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation Engine Update 7</title>
      <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26162#M287</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Latest update:&lt;/P&gt;&lt;P&gt;TE Engine 7.1.1(Engine:57.990002623)&lt;/P&gt;&lt;P&gt;開始可支援自訂YARA Rule(開源的惡意程式特徵碼工具)&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portaleventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk123156"&gt;https://supportcenter.checkpoint.com/supportcenter/portaleventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk123156&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 15:58:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26162#M287</guid>
      <dc:creator>Danny_Yang</dc:creator>
      <dc:date>2018-06-18T15:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Emulation Engine Update 7</title>
      <link>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26163#M288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2018/06/13/introducing-cadet-ai-technology-in-action/"&gt;https://blog.checkpoint.com/2018/06/13/introducing-cadet-ai-technology-in-action/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;這個先進的ML技術可大大強化TE對於未知惡意程式的模擬效率與準確度，也是Check Point結合AI用於資安防禦技術的開端! 相信接下來會有更多的AI應用於SandBlast/Threat Prevention中。&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Jun 2018 16:03:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Chinese-%E4%B8%AD%E6%96%87/Threat-Emulation-Engine-Update-7/m-p/26163#M288</guid>
      <dc:creator>Danny_Yang</dc:creator>
      <dc:date>2018-06-18T16:03:18Z</dc:date>
    </item>
  </channel>
</rss>

