- play_arrow Overview
- play_arrow Juniper Advanced Threat Prevention Cloud Overview
- play_arrow Juniper Advanced Threat Cloud Prevention Setup
-
- play_arrow Juniper ATP Cloud Web Portal
- play_arrow Juniper ATP Cloud Web Portal Overview
-
- play_arrow Enroll SRX Series Firewalls in Juniper ATP Cloud Web Portal
- play_arrow Configure Juniper ATP Cloud Features
- play_arrow Allowlists and Blocklists
- play_arrow Email Scanning: Juniper ATP Cloud
- play_arrow File Inspection Profiles
- play_arrow Adaptive Threat Profiling
- play_arrow Feeds Configuration
- play_arrow Infected Hosts
- play_arrow Threat Intelligence Sharing
- play_arrow Misc Configurations
-
- play_arrow Administration
- play_arrow Juniper ATP Cloud Administration
- Modify My Profile
- Create and Edit User Profiles
- Set Password
- Application Tokens Overview
- Create Application Tokens
- Multi-Factor Authentication Overview
- Configure Multi-Factor Authentication for Administrators
- Set Up Single Sign-on with SAML 2.0 Identity Provider
- Configure SSO Settings
- View Audit Logs
-
- play_arrow More Documentation
- play_arrow ATP Cloud Tech Library Page Links
-
Email Attachments Scanning Overview
Access the Email Attachments page from the Monitor > Files > Email Attachments menu.
Benefits of Viewing Scanned Email Attachments
Allows you to view a compiled list of suspicious email attachments all in one place, including the file hash, threat level, filename, and malware type.
Allows you to filter the list of email attachments by individual categories.
Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.
The following information is available on this page.
Field | Definition |
---|---|
Detection Engine | Displays the name of the detection engines with the highest confidence in threat detection For more information, see Table 2. Other detection engines can also reach the same verdict. When two or more detection engines detects the same malware, the verdict engine determines which detection engine should be displayed in this column. |
Signature ID / SHA-256 / ML Hit | If applicable, the Signature ID uniquely identifies the signature that is triggered for this detection; otherwise, the SHA-256 file hash is displayed.
|
Threat Level | The threat score |
Date Scanned | The date and time the file was scanned. |
Filename | The name of the file, including the extension |
Recipient | The email address of the intended recipient |
Sender | The email address of the sender |
Malware Name | The type of malware found |
Status | Indicates whether the file was blocked or permitted. |
Category | The type of file Examples: PDF, executable, document |