Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
David_Spencer
Advisor

bypassing Anti-Virus and threat emulation and extraction

We are working on a test phishing campaign to help educate our users on identifying bad emails.

 

Checkpoint is catching the bogus attachments and blocking the links in our test emails, which is both good and bad.

I've whitelisted the emails in the MTA, but I'm not sure if I'm able to somehow whitelist the external sender address or URLS on the other blades.

 

for example, on the AV Blade, dont prevent access to cnn.compromisedblog.com

or on the threat extraction/emulation, dont check or modify attachments from @gmailCompromised.com

 

0 Kudos
1 Reply
This widget could not be displayed.