![]() |
![]() |
![]() |
TRITON RiskVision System Management : Managing RiskVision traffic capture and analysis
|
2.
|
1.
|
Start the Capture service from the System > Services tab.
|
2.
|
When the Capture service is running, check the Analytics tab to make sure traffic capture has started. If it does not start automatically, switch the toggle to ON.
|
![]() |
The File Sandboxing cloud service, enabled by default, uses ThreatScope™ technology to analyze potentially malicious files in a sandbox environment, then provides detailed forensic reporting about file behavior.
|
![]() |
Threat Protection Appliance offers advanced files analysis and behavioral sandboxing.
|
![]() |
![]() |
To test communication with the cloud service manually, click Test Connection.
|
1.
|
Click Configure analysis platform.
|
2.
|
In the Configure Platform dialog box, select Threat Protection Appliance.
|
3.
|
4.
|
If you have configured RiskVision to use a proxy to connect to the Internet, but do not want communication with the Threat Protection appliance to go through the proxy, mark Ignore proxy settings.
|
5.
|
Click OK.
|
1.
|
Click Configure analysis platform.
|
2.
|
In the Configure Platform dialog box, select the File Sandboxing radio button.
|
3.
|
Click OK.
|
1.
|
![]() |
![]() |
![]() |
TRITON RiskVision System Management : Managing RiskVision traffic capture and analysis
|