Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Security Director Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Allowlists Overview

date_range 18-Dec-24

An allowlist contains known trusted IP addresses, hashes, email addresses, and URLs. Content downloaded from such endpoints are not scanned for malware.

Allowlists support the following types:

  • Anti-malware—IP address, URL, file hash, and e-mail sender.

  • SecIntel—IP address and domain

  • ETI—IP address and hostname

  • DNS—Domains

  • Reverse Shell—IP address and domain name.

Note:
  • For IP addresses and URLs, the web GUI performs basic syntax checks to validate the entries.

  • A hash is a unique signature for a file that is generated by an algorithm. You can add custom allowlist hashes for filtering in a TXT file with each entry on a single line. You can only have one running file with a maximum of 15,000 file hashes.

Juniper Secure Edge makes requests every two hours for new and updated feed content.

Benefits of Allowlists

Allows users to download files from sources that are known to be safe. Allowlist can be added to in order to decrease false positives.

footer-navigation