Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Use Reports to Evaluate Internet Activity > Advanced File Analysis report
Advanced File Analysis report
With TRITON AP-WEB, when Advanced File Analysis is enabled on the Settings > Scanning > Scanning Options page, you can use the Reporting > Advanced File Analysis report page to view specific information about the results of advanced file analysis. The report is designed to provide visibility into suspicious files accessed through your network and sent to either of the following for analysis:
*
*
Use the options above the table to filter the data that is displayed.
*
The Time period for the report.
*
If you are using Microsoft SQL Express, the maximum time period is 30 days.
*
The Total number of incidents reported for that time period is provided.
*
*
Malicious to include files that analysis has found to be malicious.
*
Suspicious to include files found to have suspicious characteristics.
*
No threat detected to report on files in which analysis did not find any malicious or suspicious characteristics.
The number of files included in the table is provided for each threat level.
The top (up to 200) results that match your filter are displayed in a table. By default, the following columns are included:
*
Threat Level: an assessment of the level of threat (malicious, suspicious, or none) associated with a file.
Click a link in this column to:
*
*
 
Note 
*
Incident time: the date and time the file was sent for analysis.
*
User: the user name (or IP address) associated with the activity that prompted the file analysis.
*
Source: the IP address of the client machine in your network that sent or received the file.
Click an IP address to open an Investigative Report that will provide more details for the browsing being done by that source IP on the day the file was analyzed.
*
Destination: the IP address of the recipient of the HTTP request.
*
URL: the URL from which the file is being downloaded or to which the file is being posted.
In some cases the URL may be truncated. Hover over the entry to view the complete URL.
*
Analyzed by: the IP address of the Threat Protection cluster or the location of the File Sandbox data center.
Use the Customize option to add or remove columns from the table. In the window provided, check the box next to the column headings you want to include. Uncheck the box next to any column heading you want to remove.
*
Platform: The platform that provided the file analysis (Threat Protection or File Sandbox).
*
Severity: the level of severity of the threat, on a scale of 1 to 10.
*
Result Type: indicates whether there was a Hash match or this was considered New analysis.
Hash match means that the file hash (not the file) was actually sent for analysis and was found in the records of the analysis platform. The file is recognized and the Threat Level is known.
New analysis means we have don't have a record of having seen the file before so the entire file was sent for analysis. Analysis shows whether or not the file contains a threat.
*
Protocol: the protocol used to transfer the file.
*
File Name: the name of the file sent for analysis.
*
File Hash: a SHA1 hash of the file sent for analysis.
*
File Size (KB): the total file size, in kilobytes.
*
File Type: the type of file sent for analysis. Types include PDF, Image, Executable, Document, and Web Page as well as others.
*
Content Gateway: the IP address of the Content Gateway machine that sent the file for analysis
Note that customized column selections are not stored. The columns reset each time you exit and return to the page.
 
Note 
Use the other links and options to:
*
Use the arrows beside a column heading to change the report's sort order.
*
Click Export to CSV to add the data to a file named excel.csv, by default. If the displayed data has been filtered, the same filter is used. All columns are included in the exported data, even if not previously selected for the report.
A maximum of 10,000 rows can be included in the exported data. Any data that exceeds the limit will not be included in the spreadsheet.
*
Use the paging options below the table to display other report pages.
*
Click Refresh to update the displayed data to include information that was added to the log database files since the report was initially displayed.
Configure delegated administrator access to the Advanced File Analysis report using the Access investigative reports and Report on all clients options in the Reporting Permissions section of the Delegated Administration > Edit Roles page. The menu option Advanced File Analysis report will not be available to administrators whose role does not have both options selected.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Use Reports to Evaluate Internet Activity > Advanced File Analysis report
Copyright 2016 Forcepoint LLC. All rights reserved.