![]() |
![]() |
![]() |
![]() |
Content Gateway Analysis > Configuring Content Gateway analysis > Configuring file analysis
|
![]() |
Antivirus Scanning uses antivirus definition files to identify virus-infected files.
|
![]() |
Rich Internet application scanning examines Flash files for malicious content.
|
![]() |
FTP file scanning examines inbound FTP files for malicious content.
|
1.
|
Select Off to disable antivirus analysis.
|
2.
|
Select On (default) to enable antivirus analysis of files from uncategorized sites and files from sites with elevated risk profiles, as identified by Forcepoint Security Labs.
|
3.
|
Select Aggressive analysis to apply antivirus analysis to inbound files from sites with elevated risk profiles and from sites with lower risk profiles. This option is enabled by default.
|
1.
|
To specify the types of files Content Gateway is to analyze, click File Type Options. As a best practice, analyze all suspicious files, as identified by Forcepoint Security Labs, and all executable and unrecognized files.
|
2.
|
To always analyze files having a specific extension, select Files with the following extensions, enter the extension in the entry field and click Add.
|
1.
|
Check the box next to Enable Advanced File Analysis.
|
2.
|
Open the Advanced File Analysis platform drop-down.
|
3.
|
b.
|
To not send files having a specific extension, check Files with the following extensions, enter file extensions in the input box provided, and click Add. Multiple file extensions can be added in a comma separated list.
|
With the Hybrid Module, the File Sandboxing option available with Forcepoint Web Security Cloud is enabled if Advanced File Analysis is enabled and Cloud Service is selected.
|
4.
|
If you have purchased Forcepoint Advanced Malware Detection, you can select On Premises from the drop-down.
|
a.
|
Enter the IP address of the Controller (prod1 [P] interface) in the Controller IP address entry field.
|
b.
|
Click Check Status to confirm that the appliance is installed at that IP address. This check does not ensure connection to Content Gateway.
|
5.
|
When you are done configuring advance file analysis options, click OK to cache your changes. Changes are not implemented until you click Save and Deploy.
|
![]() |
Is not classified as "malicious" in the Forcepoint URL Database.
|
![]() |
Passes all selected Security Threats: File Analysis analytics.
|
![]() |
Is a supported file type. Executable files are always supported. See this knowledge base article for a list of supported file types.
|
Because the file was not detected as malicious, it was not blocked and has been delivered to the requester.
|
To receive advanced file analysis alerts, which is the mechanism used to send information about files found to be malicious by analysis, you must enable and configure email or SNMP alerts.
|
The Content Gateway web proxy manages traffic sent to Forcepoint Advanced Malware Detection for Web.
The User-Agent is ssbc.
Filter.config rules are configured, by default, in Content Gateway. If Content Gateway is in a proxy chain or behind a firewall, those devices may have to be configured to meet the requirements described above.
|
2.
|
The URL is not categorized as "malicious" and Security Threats: File Analysis does not find the file to be malicious.
|
a.
|
Access and evaluate the Advanced File Analysis report. See Advanced File Analysis report for information about using that report.
|
To receive alerts about files found to be malicious by advanced file analysis, you must enable and configure email or SNMP alerts.
|
![]() |
![]() |
![]() |
![]() |
Content Gateway Analysis > Configuring Content Gateway analysis > Configuring file analysis
|