1. Home
  2. Docs
  3. Inbound Shield™
  4. CheckPoint integration
  5. Usage

Usage

Trustifi to CheckPoint

Whenever Trustifi finds a new type of threat during an email scan, the information will be automatically sent to CheckPoint.

CheckPoint will then use this information to run a scan across all of the system’s protected endpoints to see if the threat may be located anywhere.

If a match is found, the system admins will receive an email alert containing information about which threat was found, on which devices, and more.

 

CheckPoint threat notification

A threat notification from CheckPoint

CheckPoint to Trustifi

CheckPoint will continuously monitor the system’s protected endpoints.

If a new type of threat is found, CheckPoint will send the information to Trustifi. Trustifi will then use this threat intelligence to scan the system’s protected mailboxes and look for a match.

 

A threat intelligence notification from Trustifi

A threat intelligence notification from Trustifi

Once the threat scan has been completed, the admin can view the scan results like so:

Log in to the Trustifi web portal and navigate to “Inbound Management”Open the “Audit Log” tabClick on the Threat Response log
Finding the Trustifi Threat Response log

Finding the Threat Response log

When the Threat Response log is clicked, a window will open with details regarding where the new threat was found (if it was found) and which action was taken on these emails.

 

Viewing the Threat Response log

Viewing the Threat Response log

How can we help?