Create an Anti-malware Profile
You are here: Security Services > Advanced Threat Prevention > Anti-malware.
Configure the anti-malware profiles for SRX Series Firewall. The profile lets you define which files to send to the cloud for inspection and the action to be taken when malware is detected.
To create an anti-malware profile:
Field |
Action |
---|---|
Name |
Enter a name for the anti-malware profile. The name must be a unique string of alphanumeric, special characters and 64 characters maximum. Special characters such as & ( ) ] ? " # are not allowed. |
Verdict threshold |
Select a threshold value from the list. The threshold value determines when a file is considered malware. If the cloud service returns a file verdict equal to or higher than the configured threshold, then that file is considered as malware. |
Protocols | |
HTTP |
Enable this option to inspect advanced anti-malware (AAMW) files downloaded by hosts through HTTP protocol. The AAMW files are then submitted to Juniper ATP Cloud for malware screening. Once you enable this option, configure the following:
|
IMAP |
Enable this option to inspect and manage email attachments sent over IMAP email management. Once you enable this option, configure the following:
|
SMB |
Enable this option to inspect files downloaded by hosts through Server Message Block (SMB) protocol. SMB protocol enables applications or users to access files and other resources on a remote server. Once you enable this option, configure the following:
|
SMTP |
Enable this option to inspect and manage email attachments sent over SMTP email management. Once you enable this option, configure the following:
|
Fallback Actions |
|
Global fallback action |
Select None, Permit, or Block action from the list to permit or block the file regardless of its threat level. |
Logs |
Enable this option to add the event to the log file. |
Specific Fallback Configurations |
|
Additional Logging |
|
Files under verdict threshold |
Enable this option to create a system log entry when the file verdict number is less than the threshold. |
Blocklist |
Enable this option to create a system log entry when an attempt is made to access that are listed in the blocklist. |
Allowlist |
Enable this option to create a system log entry when an attempt is made to access that are listed in the allowlist. |