Post

Check Point Sandblast

Check Point Threat Emulation, also known as SandBlast, is a security solution that proactively defends against advanced threats by simulating and analyzing potentially malicious files in a secure, isolated environment (sandbox). This technology detects and prevents zero-day attacks, ransomware, and other sophisticated malware by executing suspicious files in a virtual environment to observe their behavior before they can impact the network.

x


Enabling Threat Emulation

In this deployment, we added a freshly installed Security Gateway that we’ll use as the Sandblast Box (cpsb)

x


Before enabling Sandblast, make sure this box can access internet

x


Now on cpsb, enable Threat Emulation and select the location to be local

x


Hit next until it finishes, after that we have Threat Emulation Blade enabled on this box

x


Next on the Security Gateway (cpsg), enable the Threat Emulation as well and point it to other box

x


And select the cpsb box

x


Now the Security Gateway also has Threat Emulation enabled, but pointing to a remote box

x


Configuring Policy

On Threat Prevention » Custom Policy, create a new Profile and enable Threat Emulation Blade

x


Enable the protocols which we’d like to send to sandbox, in this case we’ll focus on SMB

x


Then on the File Types, we can see all the supprted types for sandboxing

x


Emulating Threat

To emulate threat, we’ll download infected files from Eicar and save it on our file server

x


Here on the user PC, first we try copying normal files over SMB

x


On the Sandblast log we can see the files are determined to be clean and allowed

x

x


But when we try copying infected files, we get a network error

x


That’s because Check Point determines that the files are not safe and take the prevent action

x

x


Threat Extraction

Check Point Threat Extraction is a cybersecurity solution designed to protect against document-based threats by removing potentially malicious content from files. It proactively cleans files by extracting and reconstructing them, stripping away exploitable content, such as embedded macros or active code, while preserving the original format. This ensures that only safe, sanitized files are delivered to users, reducing the risk of zero-day attacks and malware infections.

x


On the Client PC, if we try accessing malicious files like this Test File, we will still be able to download it like normal

x


But behind the hood, Check Point runs an extraction to remove any potensially malicious threat inside the file, and delivering the cleaned up version of it

x

x


This post is licensed under CC BY 4.0 by the author.