- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
We have check point gateway with 7000 series. And last month we have updated our license. So, we want to use Anti Spam & Email Security feature. How can we enable that? How can we configure any rules for that associated blade? If there are things we need to know before enabling that feature?
Start with the relevant documentation:
Here a FAQ regarding MTA:
https://support.checkpoint.com/results/sk/sk108553
https://support.checkpoint.com/results/sk/sk109699
Why you might need MTA:
https://support.checkpoint.com/results/sk/sk98973
Not sure you run VSX but this is not supported:
https://support.checkpoint.com/results/sk/sk79700
@Lesley thanks for the detail explanation.
Is enabling MTA a must to use Anti spam and email security? And what are both the advantages and disadvantages of MTA enabling on a maestro?
If email is transported with TLS, an MTA is required as we won't be able to see the mail content otherwise.
@gemechis MTA is not required for AntiSpam-Blade. Without MTA you have features like BlackList block, IP reputation and content spam check for messages they are not sent encrypted (mentioned by @PhoneBoy )
ThreatExtraction (SandBoxing, remove malicious content from file-attachments or convert to pdf) requires MTA.
As a hint....All features they must be configured in the old SmartDasboard can be used without MTA. All other configuration in the mail tab of ThreatPrevention-Profile needs MTA enabled.
@Wolfgang Thanks for the reply.
Today, I have tried to configure "Configuring a Content Anti-Spam Policy", "Configuring an IP Reputation Policy", "Configuring a Block List". From this 3, IP retutation is working. But we tried to block using domains but emails are arriving at our mailbox.
What could be the issue. I have not enabled MTA,
Any help on this
@Lesley @PhoneBoy @Wolfgang
I have checked all MTA articles and found there are three (3) deployment methods for it.
1. Check Point MTA as the organization MX record
2. Check Point MTA as an internal MTA
3. Check Point MTA in BCC Mode
My question is that if we configure using option 3 which is "Check Point MTA in BCC Mode" How does the mail extraction and emulation going to be done?
In BCC mode, a copy of the email is sent to emulation, but it is not prevented from reaching the end users inbox.
For full prevention, you need to deploy it with one of the other methods.
Hi @PhoneBoy
Thanks for the reply.
Today, I have tried to configure "Configuring a Content Anti-Spam Policy", "Configuring an IP Reputation Policy", "Configuring a Block List". From this 3, IP retutation is working. But we tried to block using domains but emails are arriving at our mailbox.
What could be the issue. I have not enabled MTA,
If SMTP is sent via TLS, then you will not be able to block by domain as there is no way to see what domains are involved in the email.
In this case, you will need to use MTA mode.
@PhoneBoy okay.
So,
1. Which one's can I configure without enabling MTA?
2. If enabling MTA is a must to, which mode do you recommend considering resource utilization.
Dear @gemechis all depends on what do you want to achieve...
You can configure to block a mail domain, but as @PhoneBoy mentioned this wil only work if the mail arrives without TLS. You can configure to block a mail by IP-address, this will be blocked with TLS or without.
The content of a mail-message can't be checked if send via TLS, you have to decrypt these messages to do any content scan.
You can enable MTA and all features of "Configuring a Content Anti-Spam Policy", "Configuring an IP Reputation Policy", "Configuring a Block List" will work with TLS and without.
If you want to get the most valuable, you have to enable MTA, the Content Anti-Spam Policy, the IP Reputation Policy, the Block List and the ThreatExtraction features.
@Wolfgang thanks.
Is there any method in which i can enable MTA without changing my current architecture. To see the impacts
I believe not. If you enable an additional MTA in the mailflow between Sender and recipients there is always an impact. If everything is configured correct the mail messages will be delivered. But it‘s the behavior of a MTA accepting the messages, doing some checks and then send them to the next hop.
Okay. So, to see all the impact on the gateway, I will configure MTA with a BCC mode and check the impact.
I am planning to configure MTA with third option of deployment of "MTA in Backward Compatibility Mode". In that case what's the need of importing our mailboxes certificate to the checkpoint security gateway?
Also, who is responsible for decrypting the incoming mail? Is that a mailbox or security gateway?
You have to have a certificate for the MTA on the Security Gateway to terminate SMTP over TLS.
This handles the transport layer encryption.
The message will be queued/scanned on the gateway and forwarded to the configured next-hop MTA.
Note content security can't be done on the message if it's encrypted (e.g. with S/MIME), but the headers should be fully visible.
@gemechisd There are not much configuration options. You have to enable the blade and most of the things are configured via the old SmartDashboard. There you can enable AntiSpam- and IPreputation-level and configure exceptions. If you enable the MTA on the gateway you can use your TP profile to check messages for viruses and emulate files in TP environment.
AntiSpam and IP-reputation both have really good results but configuration options are very limited. No quarantine, limited exceptions, no address checking in the internal mail environment……
@Wolfgang Thanks for the explanation. But If don't want to enable MTA is AntiSpam and IP-reputation the only option working without MTA?
Who is responsible for analysing attachments?
We have a check point deployment in our environment and we need to enable the "Anti Spam and Email Security" Blade. And we need to configure
After enabling the blade, I have configured the IP Reputation and Block list. And the IP Reputation worked but the block list is not. what could be enabled to see the block list working in our environment.
What have you configured in the block list ip/domain/email?
Is anti-spam seeing SMTP TLS traffic (sk98973)?
Yes. It's encrypted.
Would you mind send us some screenshots how this is configured? Just blur out the sensitive data.
Andy
@the_rock
Below you can find the screenshots.
Looks right. I would confirm with TAC, but what Phoneboy said seems most logical.
Andy
@the_rock
Ok. one thing i need to clarify. What are the possible configurations I can do with out enabling MTA?
Sorry for the delay mate, just saw this message, apologies. I really cant give you good suggestion on that, as Im not sure. I would verify with TAC.
Andy
@the_rock
will wait for the response
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
11 | |
8 | |
7 | |
7 | |
7 | |
6 | |
6 | |
5 | |
5 |
Thu 25 Sep 2025 @ 03:00 PM (IDT)
NIS2 Compliance in 2025: Tactical Tools to Assess, Secure, and ComplyThu 25 Sep 2025 @ 03:00 PM (IDT)
NIS2 Compliance in 2025: Tactical Tools to Assess, Secure, and ComplyThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY