HTTP File Download Overview
Access the HTTP File Download page from the Monitor > Files > HTTP File Downloads menu.
Benefits of viewing HTTP File Downloads
-
Allows you to view a compiled list of suspicious downloaded files all in one place, including the signature, threat level, URL, and malware type.
-
Allows you to filter the list of downloaded files by individual categories.
Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.
The following information is available on this page.
Field |
Definition |
---|---|
Detection Engine |
Displays the name of the detection engines with the highest confidence in threat detection. For more information, see Table 2. Other detection engines can also reach the same verdict. When two or more detection engines detects the same malware, the verdict engine determines which detection engine should be displayed in this column. |
Signature ID / SHA-256 / ML Hit |
If applicable, the Signature ID uniquely identifies the signature that is triggered for this detection; otherwise, the SHA-256 file hash is displayed.
|
Threat Level |
The threat score Click the three vertical dots at the top of the column to filter the information in the page by threat level. |
Filename |
The name of the file, including the extension |
Last Submitted |
The time and date of the most recent scan of the file |
URL |
The URL from which the file originated |
Malware Name |
The name of file and the type of threat if the verdict is positive for malware. Examples: Trojan, Application, Adware. If the file is not malware, the verdict is "clean." |
Category |
The type of file. Examples: Portable Document Format, executable, document |
Detection Engine Names |
Description |
---|---|
AI-PTP E |
Juniper’s on-device ML flow-based antivirus |
AI-PTP P | Juniper’s on-device flow-based antivirus |
Allowlist |
Known clean override |
AntiVirus A |
Commercial antivirus |
AntiVirus B |
Commercial antivirus |
AntiVirus M |
Commercial cloud multi-antivirus engine |
Blocklist |
Known clean override |
Clean Override |
Known clean override |
Dynamic ML C |
Juniper’s sandbox-based ML |
Dynamic ML D |
Juniper’s sandbox-based ML |
Dynamic ML N |
Juniper’s cloud sandbox-based ML |
Reputation |
File hash reputation |
Static ML G |
Juniper’s cloud ML antivirus |
Static ML J |
Commercial cloud static antivirus |
Static ML P |
Juniper’s ML engines using file attributes |
Yara |
Juniper’s Yara engine signatures |