- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
hi all,
as this is my first post on here please forgive me if i'm not fully confirming to board standards 😉 let me know and i will adjust 🙂
the thing i have noticed is that our firewall quite often allows for virus infected emails to pass trough the firewall altough our antivirus blade and antispam blades are turned on. i have been looking at the configuration and as far as i could see this should just work.
Please let me start with explaining how the email flow is setup at our end,
the email is first delivered to our Spam Filter in our DMZ this is the first time the traffic passes the firewall with protocol inspection then the spam filter does it's magic on the mail and then passes the email to our exchange server in a second DMZ so passing the firewall a second time. and again doing protocol inspection.
the other day i had an Endpoint Security allert again from our ESET virus scanner on a client system telling me that it had found and deleted a Virus from the system: trojan;VBA/TrojanDownloader.Agent.DZ
i'm starting to doubt that the protocol inspection and AntiVirus - AntiSpam blades do not function the correct way. as i have been searching for the issue for a bout 6 months now also together with support i thought lets ask the experts on the Checkmates Forum.
what can i do / test / check to make sure the firewall pick out these emails containing this kind of nasty attachments ?
@Harm_United , few questions to get a better idea of what is going on here:
1. Are you using default (Kaspersky) AV engine on Check Point, or have you disabled it and are using alternate engine?
2. What is the depth of the archive scanning that you have configured in AV blade and do you have it enabled?
3. Are you using S/MIME signed email?
4. Do you have Mail AV configured to scan all files or "known to contain"?
5. You have mentioned the ESET discovering the virus on the endpoint, but was it discovered in the email?
6. Do you have an AV on your Exchange box? If yes, was the same virus discovered on it as well?
1. Are you using default (Kaspersky) AV engine on Check Point, or have you disabled it and are using alternate engine?
where using the default kaspersky engine
2. What is the depth of the archive scanning that you have configured in AV blade and do you have it enabled?
The nesting level is set to 7 at the moment. and if nesting exceeds the set level its set to block the file.
3. Are you using S/MIME signed email?
No, the emails are standard emails. and the emails recieved with virusses are standerd emails as well
4. Do you have Mail AV configured to scan all files or "known to contain"?
At the moment its set to all files.
5. You have mentioned the ESET discovering the virus on the endpoint, but was it discovered in the email?
Eset Triggerd on the virus in Outlook.exe
6. Do you have an AV on your Exchange box? If yes, was the same virus discovered on it as well?
Nope there is no AV on the exchange system. there is on the baracuda
Hmm... DO you have your gateway configured as MTA with the cert of your anti-spam appliance?
It almost seems as if you are passing encrypted mail through the Check Point without actually scanning it.
Take a look here:
https://community.checkpoint.com/t5/IPS-Anti-Virus-and-Anti-Bot/Email-MTA-setup/td-p/15007
and here:
Try running the same flow with Threat Emulation blade enabled.
It should catch the file.
Thanks
Tal
Hi,
at the moment the Firewall is not set to be the MTA. and the Appliance is only passing the emails ons standard SMTP towards the Exchange host to have no issues with certificates 😉
I agree.
Your described environment is classic for MTA deployment. It will catch e-mails traversing through the GW using TLS, and will improve the prevention rate.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 19 | |
| 10 | |
| 9 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY