advanced-anti-malware policy
Syntax
policy <policy-name>{ blacklist-notification { log; } default-notification { log; } fallback-options { action [block | permit]; invalid-content-size { action [block | permit]; notification { log; } } notification { log; } out-of-resources { action [block | permit]; notification { log; } } service-not-ready { action [block | permit]; notification { log; } } submission-timeout { action [block | permit]; notification { log; } } unknown-file { action [block | permit]; notification { log; } } verdict-timeout { action [block | permit]; notification { log; } } } http { action [block | permit]; client-notify { file file-name; message block-message-to-client; redirect-url redirect-url; } file-verdict-unknown (block | permit); inspection-profile inspection-profile-name; notification { log; } } imap { inspection-profile inspection-profile-name; notification { log; } } smb { inspection-profile inspection-profile-name; notification { log; } } smtp { inspection-profile inspection-profile-name; notification { log; } } whitelist-notification { log; }
Hierarchy Level
[edit services advanced-anti-malware]
Description
The connection to the Juniper Advanced Threat Prevention Cloud is launched on-demand. It is established only when a condition is met and a file or URL must be sent to the cloud. The cloud inspects the file and returns a verdict number (1 through 10). A verdict number is a score or threat level. The higher the number, the higher the malware threat. The SRX Series Firewall compares this verdict number to the Juniper Advanced Threat Prevention Cloud policy settings and either permits or denies the session. If the session is denied, a reset packet is sent to the client and the packets are dropped from the server.
Juniper Advanced Threat Prevention Cloud policies append to the Junos OS security policies by defining the actions to take when a file is considered malware or when an attempt is made to download a file from a location that’s on a custom blocklist or allowlist.
Use this command to configure the Juniper Advanced Threat Prevention Cloud policy.
Options
policy-name |
Name of the Juniper Advanced Threat Prevention Cloud policy. Note:
Starting in Junos OS Release 18.2R1, for unified policies, a
|
blacklist-notification |
(Optional) Create a system log entry when an attempt to access a website
listed in the blocklist file is made. Use |
default-notification |
Create a system log entry if the cloud returns a verdict number less than
the verdict-threshold. Use |
fallback-options (action block | action permit) |
The action to take when the SRX Series Firewall runs out of resources or
the connection to the cloud is lost. The default is |
fallback-options |
(Optional) Create a system log entry when fallback occurs. Use
|
http | This command allows you to inspect advanced anti-malware (AAMW) files downloaded by hosts through Hypertext Transfer Protocol (HTTP) protocol. The AAMW files are then submitted to Juniper ATP Cloud for malware screening. |
http action (permit | block) |
This command allows you to permit or block malware based on the detected malware. Starting in Junos OS release 21.3R1, when the http action is set as block, the detected malware file will be blocked immediately after signature match. Juniper ATP cloud will not get the full file for analysis, instead it will receive a notification of the malware hit event. You can view the malware information Juniper ATP Cloud Portal. The Partial file tab displays the malware hit event information for all blocked signature match detections. |
http(s) client-notify (message | file | redirect-url) |
(Starting in Junos OS release 19.3R1) This command allows you to configure HTTP URL redirection for a customized client notification based on detected malware with the block action. |
http(s) file-verdict-unknown (permit | block) |
(Starting in Junos 19.3R1) This command allows you to permit or block malware based on the detected malware having a verdict of “unknown.” By default, “unknown” malware is permitted. |
smb |
(Starting in Junos 21.1R1) This command allows you to inspect advanced anti-malware (AAMW) files downloaded by hosts through Server Message Block (SMB) protocol. The AAMW files are then submitted to Juniper ATP Cloud for malware screening. Note:
|
inspection-profile |
Name of the Juniper Advanced Threat Prevention Cloud profile. This profile defines what file types or file categories are to be sent to the cloud for inspection. |
match verdict-threshold |
The verdict-threshold defines the number at which you want to label a file as malware. For example, if you set verdict-threshold to 7 and the cloud returns a verdict number of 7 or greater, then that file is considered malware. verdict-threshold can be any number between 1 and 10, inclusive. |
then notification |
(Optional) Create a system log entry if the cloud returns a verdict
number equal to or greater than the verdict-threshold. Use
|
whitelist-notification |
(Optional) Create a system log entry when an attempt to access a website
listed in the allowlist file is made. Use |
Table 1 shows examples of using the Juniper Advanced Threat Prevention Cloud policy options.
Addition |
Description |
---|---|
Action and notification based on the verdict number and threshold |
Defines the threshold value and what to do when the verdict number is greater than or equal to the threshold. For example, if the threshold is 7 and Juniper Advanced Threat Prevention Cloud returns a verdict number of 9 for a file, then that file is blocked from being downloaded and a log entry is created. set services advanced-anti-malware policy aamwpol1 match verdict-threshold 7 set services advanced-anti-malware policy aamwpol1 then action block set services advanced-anti-malware policy aamwpol1 then notification log |
Default action and notification |
Defines what to do when the verdict number is less than the threshold. For example, if the threshold is 7 and Juniper Advanced Threat Prevention Cloud returns a verdict number of 3 for a file, then that file is allowed to be downloaded and create a log entry. set services advanced-anti-malware policy aamwpol1 default-notification log |
Name of the inspection profile |
Name of the Juniper Advanced Threat Prevention Cloud profile that defines the types of file to scan. set services advanced-anti-malware policy aamwpol1 inspection-profile profile1 |
Fallback options |
Defines what to do when error conditions occur or when there is a lack of resources. The following fallback options are available:
set services advanced-anti-malware policy aamwpol1 fallback-options action block set services advanced-anti-malware policy aamwpol1 fallback-options notification log The following fallback options are available:
If none of listed fallback condition is hit, then the default fallback option is applied. |
Blocklist notification |
Defines whether to create a log entry when attempting to download a file from a site listed in the blocklist file. set services advanced-anti-malware policy aamwpol1 blacklist-notification log |
Whitelist notification |
Defines whether to create a log entry when attempting to download a file from a site listed in the allowlist file. set services advanced-anti-malware policy aamwpol1 whitelist-notification log |
User notification of malware on block action |
(Starting in Junos 19.3R1) This command allows you to configure HTTP and HTTPS URL redirection for a customized client notification based on detected malware with the block action. A block message can only be sent when a block action is configured. Note:
See request services advanced-anti-malware redirect-file for details on adding a custom file. set services advanced-anti-malware policy p1 http client-notify message set services advanced-anti-malware policy p1 http client-notify file set services advanced-anti-malware policy p1 http client-notify redirect-url <enter URL> |
Block or permit malware when file verdict is “unknown” |
(Starting in Junos 19.3R1) This command allows you to permit or block malware based on the detected file having a verdict of “unknown.” By default, an “unknown” file verdict is permitted. (Note this only applies to HTTP and HTTPS traffic.) set services advanced-anti-malware policy p1 http file-verdict-unknown <block|permit> |
Required Privilege Level
View
Release Information
Command introduced in Junos OS Release 15.1X49-D33.
The SMB
option is introduced in Junos OS Release
21.1R1.