Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
Juniper Security Director Cloud User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Create Allowlists

date_range 18-Dec-24
  1. Click Shared Services > Advanced Threat Prevention > Allowlists.
  2. Click the required tab, click +, enter the required details, and click OK.

    Setting

    Guidelines

    ANTI-MALWARE > IP

    • Enter a valid IPv4 or IPv6 IP address. For example, 1.2.3.4 or 0:0:0:0:0:FFFF:0102:0304.

    • CIDR notation and IP address ranges are also accepted. For example, IPv4: 1.2.3.4, 1.2.3.4/30, or 1.2.3.4-1.2.3.6 and IPv6: 1111::1, 1111::1-1111::9, or 1111:1::0/64.

    • For address ranges, no more than a block of /16 IPv4 addresses and /48 IPv6 addresses are accepted. For example, 10.0.0.0-10.0.255.255 is valid, but 10.0.0.0-10.1.0.0 is not.

    • For bitmasks, the maximum amount of IP addresses covered by bitmask in a subnet record for IPv4 is 16 and for IPv6 is 48. For example, 10.0.0.0/15 and 1234::/47 are not valid.

    ANTI-MALWARE > URL
    • Enter a URL in domainname.domainextension format, for example, juniper.net.

    • Wildcards and protocols are not valid entries. The system automatically adds a wildcard to the beginning and end of URLs. Therefore juniper.net also matches a.juniper.net, a.b.juniper.net, and a.juniper.net/abc. If you explicitly enter a.juniper.net, it matches b.a.juniper.net, but not c.juniper.net.

    • You can enter a specific path. If you enter juniper.net/abc, it matches x.juniper.net/abc, but not x.juniper.net/123.

    ANTI-MALWARE > File Hash
    • You can upload several TXT files that will be automatically combined into one file named current list.

    • List hashes in a TXT file with each entry on a single line. You can only have one running hash file containing up to 15,000 file hashes. You can add, edit, or delete a hash value.

    • Click Download to download the TXT file if you want to view or edit the hashes.

    • Click Select Hash File Items Upload Option > Replace current list to edit the current list and not delete it entirely. You can download the existing file, edit it, and then upload it again.

    • Click Select Hash File Items Upload Option > Merge with current list to merge a new TXT file with the existing TXT file. The hashes in both files combine to form one TXT file with all hashes.

    • Click Select Hash File Items Upload Option > Delete from current list to delete only a portion of the current list. Create a TXT file with only the hashes you want to remove from the current list and upload the file using this option. The hashes in the uploaded file are then deleted from the current list.

    • Click Delete All or Delete Selected to delete all lists that have been added or the selected list respectively.

    ANTI-MALWARE > Email Sender

    • Enter email address in the name@domainname.domainextension format.

    • Wildcards and partial matches are not supported. To include an entire domain, enter the domain in domainname.domainextension format.

    SECINTEL

    • Enter an IPv4 or IPv6 address, range, subnet.

    • Enter domain in domainname.domainextension format.

    • Wildcards are not supported.

    • The IP or domain is sent to Juniper Secure Edge to be excluded from any security intelligence blocklists or C&C feeds (both Juniper’s global threat feed and third party feeds). It will also be listed under the C&C allowlist management page.

    • Click Upload File to upload a list of servers as a TXT file with each IP or domain in a single line. The TXT file must include all IPs or all Domains, each in their own file. You can upload multiple files, one at a time.

    • You can also manage the entries using the Threat Intelligence API. The entries are available in the Threat Intelligence API under “whitelist_domain” or “whitelist_ip” feed names. See Juniper ATP Cloud Threat Intelligence Open API Setup Guide.

    Warning:

    Adding a C&C server to the allowlist automatically triggers a remediation process to update any affected hosts (in that realm) that have contacted the whitelisted C&C server. All C&C events related to this allowlisted server will be removed from the affected hosts’ events, and a host threat level recalculation will occur. If the host score changes during this recalculation, a new host event appears describing why it was rescored. For example, “Host threat level updated after C&C server 1.2.3.4 was cleared." Additionally, the server will no longer appear in the list of C&C servers because it has been cleared.

    ETI

    Enter IP address or hostnames that can be excluded from encrypted traffic analysis.

    DNS

    Enter the domains in domainname.domainextension format that can be excluded from DNS filtering.

    REVERSE SHELL

    Enter IP address or domains that can be excluded from scans for reverse shell attacks.

footer-navigation