- Products
- Learn
- Local User Groups
- Partners
-
More
Celebrate the New Year
With CheckMates!
Value of Security
Vendor Self-Awareness
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
Mobile Security
Buyer's Guide Out Now
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hello
i want to learn difference between MTA and Threat Extraction. is mail attachment exemainig or not if MTA is only enabled? and what is the difference if MTA and Threat Extraction opened both?
Thanks
For Threat Extraction to work on email, MTA is required currently.
Without enabling MTA, Threat Extraction only works for HTTP and HTTPS (when HTTPS Inspection is also used).
without enabling Threat exraction, MTA checks mail content and attachment or not?
Before you enable the Threat Extraction blade, you must deploy the gw as a MTA. But without enabling threat extraction and threat emulation you can not configure a gateway as a MTA. Deploying gw as a MTA is second step of enabling Threat Emulation/extraction. To configure MTA, enable either Threat Emulation/Extraction blade (available since R77), or Anti-Spam & Email Security blade. Without threat ext anti-spam&email sec checks mail content and attachment
we enabled MTA (without Threat extraction) and Threat emulation.according to you are mail attachments without Threat extraction being reviewed or not?
Yes, threat emulation will check attachments.
if threat emulation checks the attachment, why we need threat extraction?
The Threat Extraction blade extracts potentially malicious content from files before they enter the corporate network. To remove possible threats, the Threat Extraction blade can create a simpler version of the file in PDF format. The Threat Extraction capability provides a safe version of potentially malicious content to users. This way users can be assured they are protected from the malware.
Thanks for ur answers
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY