Check Point Harmony Email & Collaboration includes advanced attachment protection through Threat Emulation (sandboxing) and Threat Extraction (Content Disarm and Reconstruction). This guide covers configuring these technologies to protect your organization from zero-day malware and advanced persistent threats delivered via email attachments.
Prerequisites
Before configuring attachment sandboxing, ensure you have:
- Harmony Email & Collaboration connected to Microsoft 365 or Google Workspace
- Administrator access to the Check Point Infinity Portal
- Complete Protect license (Threat Emulation requires this tier)
- Understanding of your security requirements and user productivity needs
Understanding Attachment Protection Technologies
Harmony Email provides two complementary attachment protection methods:
Threat Emulation (Sandboxing)
| Feature | Description |
|---|---|
| Technology | CPU-level sandbox analysis |
| Detection | Zero-day malware, evasive threats, APTs |
| Process | Opens file in isolated VM, monitors behavior |
| Analysis Time | 30 seconds to 3 minutes |
| Output | Verdict: Clean, Malicious, or Suspicious |
Threat Extraction (CDR)
| Feature | Description |
|---|---|
| Technology | Content Disarm and Reconstruction |
| Protection | Removes potentially dangerous content |
| Process | Strips macros, active content, embedded objects |
| Delivery Time | Immediate (no waiting) |
| Output | Sanitized file safe for use |
Recommended Configuration
| Scenario | Threat Emulation | Threat Extraction | User Experience |
|---|---|---|---|
| Maximum Security | Enabled | Enabled | Receive clean file immediately, original after emulation |
| Balanced | Enabled | Disabled | Wait for emulation, receive original if clean |
| Productivity First | Background only | Enabled | Clean file immediately, emulation for reporting |
Step 1: Access Anti-Malware Configuration
- Sign in to https://portal.checkpoint.com
- Navigate to Harmony > Email & Collaboration
- Go to Security Settings in the left menu
- Click Security Engines
- Locate Anti-Malware and click Configure
Step 2: Verify Engine Availability
Check which protection engines are available with your license:
View Enabled Engines
-
In the Anti-Malware configuration, locate Engines Enabled
-
Verify available engines:
- Anti-Virus: Signature-based malware detection (all licenses)
- Threat Emulation & Anti-Virus: Advanced sandbox (Complete Protect)
-
If only Anti-Virus is shown, you may need to upgrade your license
Engine Capabilities
| Engine | Detection Method | Zero-Day Protection | Speed |
|---|---|---|---|
| Anti-Virus | Signature matching | No | Instant |
| Threat Emulation | Behavioral analysis | Yes | 30s-3min |
| Combined | Both methods | Yes | Best of both |
Step 3: Configure Threat Emulation Settings
Enable Threat Emulation
- In Anti-Malware configuration, scroll to Threat Emulation
- Enable Threat Emulation inspection
- Configure emulation scope:
| Setting | Description | Recommendation |
|---|---|---|
| All files | Emulate every attachment | Maximum security |
| Suspicious files only | Emulate files flagged by AV | Balanced |
| Unknown files only | Emulate files without known reputation | Efficient |
- Select Suspicious files only for balanced protection
- Click Save
Configure File Size Limits
- Locate File Size Settings
- Configure maximum file size for emulation:
- Default: 50 MB
- Recommended: 50 MB (maximum supported)
- Files exceeding this limit are scanned by Anti-Virus only
- Click Save
Configure Analysis Settings
- Scroll to Emulation Settings
- Configure options:
| Setting | Description | Recommendation |
|---|---|---|
| Timeout | Maximum analysis time | 120 seconds |
| OS Versions | Windows versions to test | Multiple versions |
| Fail Action | Action if emulation fails | Quarantine |
- Click Save
Step 4: Configure Threat Extraction (CDR)
Set up Content Disarm and Reconstruction for immediate safe delivery.
Enable Threat Extraction
- In Anti-Malware configuration, scroll to Threat Extraction
- Enable Clean Files (Threat Extraction)
- Configure cleaning method:
| Method | Description | File Type |
|---|---|---|
| Clean | Remove dangerous content, preserve file type | Office, PDF |
| Convert to PDF | Convert to sanitized PDF format | All supported |
- Select Clean for best user experience
- Click Save
Configure What Gets Cleaned
Threat Extraction removes the following content:
| Content Type | Default | Configurable |
|---|---|---|
| Macros | Removed | Yes |
| Active Scripts | Removed | Yes |
| Embedded Objects | Removed | Yes |
| Hyperlinks in Text | Removed | Yes |
| External Links | Removed | Yes |
| JavaScript in PDF | Removed | Yes |
| Metadata | Preserved | Yes |
To customize cleaning behavior:
- Contact Check Point Support for advanced configuration
- Some settings require support intervention to modify
Configure Cleaned File Naming
- Navigate to Security Settings > SaaS Applications
- Click Configure for Office 365 Mail or Gmail
- Click Advanced
- Scroll to Threat extracted attachment name template
- Configure naming:
- Default:
threat_extracted_{filename} - Custom: Set your preferred prefix or suffix
- Default:
- Click Save
Step 5: Configure Anti-Malware Policy
Create policies that define how attachment protection works.
Create Malware Protection Policy
- Navigate to Policy in the left menu
- Click Add a New Policy Rule
- Under Choose SaaS, select your email platform
- Under Choose Security, select Malware
- Click Next
Configure Policy Settings
- Rule Name: Enter descriptive name (e.g., "Attachment Protection - All Users")
- Email Direction: Select scope:
- Inbound: Scan incoming attachments (primary use case)
- Outbound: Scan outgoing attachments
- Internal: Scan internal email attachments
- Apply to: Select users or groups
- Click Next
Configure Protection Actions
- Policy Protection Mode: Choose mode:
- Monitor: Scan and log without blocking (testing)
- Detect and Remediate: Scan and take action (production)
- Select Detect and Remediate for protection
- Click Next
Configure Threat Actions
- When malware is detected:
| Action | Description | Recommendation |
|---|---|---|
| Quarantine | Hold email for review | Recommended |
| Delete | Permanently remove email | High security |
| Alert Only | Deliver with notification | Testing only |
- Select Quarantine for most environments
- Click Next
Enable Threat Extraction in Policy
- Scroll to Alerts section
- Enable Clean Files (Threat Extraction) checkbox
- Configure delivery behavior:
- Deliver cleaned immediately: Users get safe version right away
- Wait for emulation: Deliver original only after cleared
- Click Save and Apply
Step 6: Configure Original File Restore
Allow users to retrieve original files after emulation completes.
Enable User Self-Service Restore
- Go to Security Settings > User Interaction
- Click Attachment Restore
- Configure restore options:
| Option | Description | Recommendation |
|---|---|---|
| Auto-restore | Original delivered automatically after clean emulation | Convenient |
| User request | User must request original | More control |
| Admin approval | Admin must approve restore | Maximum security |
- Select based on your security requirements
- Click Save
Configure Restore Notifications
-
In Attachment Restore settings, configure notifications:
- Notify user when cleaned file delivered: Yes
- Notify user when original available: Yes
- Notify admin on restore request: Optional
-
Click Save
Step 7: Configure File Type Handling
Customize how different file types are processed.
View Supported File Types
Threat Emulation supports:
| Category | File Types |
|---|---|
| Office Documents | .doc, .docx, .xls, .xlsx, .ppt, .pptx, .rtf |
| Executables | .exe, .dll, .scr, .bat, .cmd, .ps1 |
| Archives | .zip, .rar, .7z, .tar, .gz |
| Scripts | .js, .vbs, .wsf, .hta |
| Images with Macros | Various (OCR + macro detection) |
Configure Blocked File Types
Block dangerous file types outright:
- Go to Security Settings > Security Engines > Anti-Malware
- Locate Blocked File Types
- Review and configure blocked extensions:
- .exe: Executables (recommended to block)
- .scr: Screen savers (often malware)
- .bat/.cmd: Batch files
- .ps1: PowerShell scripts
- Click Save
Configure Encrypted File Handling
-
Locate Encrypted Files settings
-
Configure handling:
- Quarantine: Hold password-protected files for review
- Alert: Allow delivery but notify admin
- Allow: Deliver without scanning (not recommended)
-
Recommended: Quarantine for encrypted files that can't be scanned
Step 8: Test Attachment Protection
Verify your configuration is working correctly.
Use EICAR Test File
The EICAR test file safely tests anti-malware without real threats:
- Download EICAR test file from eicar.org
- Send email with EICAR attachment to a test user
- Verify:
- Email is quarantined or attachment removed
- Event logged in Harmony Email console
- Admin notification received (if configured)
Test Threat Extraction
- Create a Word document with a macro
- Send to test user
- Verify:
- Cleaned version delivered (macro removed)
- Original file name modified (threat_extracted prefix)
- User can request original after emulation
Verify Event Logging
- Go to Events > Malware
- Filter for recent activity
- Review test events:
- Detection engine (AV or Threat Emulation)
- File details and hash
- Action taken
- User affected
Step 9: Configure Administrator Alerts
Set up notifications for malware detections.
Enable Malware Alerts
- Go to Security Settings > Alerts
- Configure notification triggers:
- Malware detected: Alert for any malware detection
- Zero-day detected: Alert for Threat Emulation catches
- High-volume attack: Alert for malware campaigns
- Enter administrator email addresses
- Select alert frequency:
- Immediate: Critical events
- Daily digest: Summary report
- Click Save
Step 10: Monitor Threat Emulation Performance
Track attachment protection effectiveness.
View Emulation Statistics
- Navigate to Reports > Anti-Malware
- View key metrics:
- Total files scanned
- Malware detected (AV vs Threat Emulation)
- Zero-day catches (Threat Emulation unique)
- Files cleaned (Threat Extraction)
Track Zero-Day Detections
Zero-day detections are files caught by Threat Emulation but missed by signature-based AV:
- Filter events by Detection Engine: Threat Emulation
- Review files caught only by behavioral analysis
- This metric demonstrates the value of sandboxing
Troubleshooting Common Issues
Attachments Not Being Scanned
Symptoms: Attachments aren't showing scan events.
Solutions:
- Verify Anti-Malware engine is enabled
- Check policy applies to affected users
- Confirm file type is supported for scanning
- Verify file size is within limits (50 MB)
Threat Extraction Not Working
Symptoms: Cleaned files not being delivered.
Solutions:
- Verify Threat Extraction is enabled in policy
- Check that file type supports cleaning (Office, PDF)
- Verify policy protection mode is "Detect and Remediate"
- Check for conflicting policies
Slow Delivery of Attachments
Symptoms: Emails with attachments are delayed.
Solutions:
- Check if waiting for emulation (expected behavior)
- Enable Threat Extraction for immediate cleaned delivery
- Reduce emulation timeout if acceptable
- Consider emulating only suspicious files
False Positives
Symptoms: Legitimate files flagged as malicious.
Solutions:
- Review file details in event log
- Submit false positive to Check Point
- Check if file contains legitimate macros (consider allow-listing)
- Create exception for specific file hash (use caution)
Best Practices
- Use both technologies: Enable Threat Emulation and Threat Extraction together
- Deliver cleaned immediately: Don't make users wait for emulation
- Block executables: Prevent .exe and script files via email
- Monitor zero-day catches: Track Threat Emulation value
- Test quarterly: Verify protection with EICAR and test macros
- Review events weekly: Check for attack patterns and trends
- Train users: Educate about attachment risks and clean file process
Next Steps
After configuring attachment sandboxing:
- Configure anti-phishing: Set up phishing detection policies
- Enable URL protection: Configure click-time protection
- Set up DLP: Protect sensitive data in attachments
- Review security reports: Monitor malware trends and zero-day catches
Additional Resources
Need help implementing attachment sandboxing? Inventive HQ specializes in advanced email security solutions. Contact us for expert deployment assistance.