Create an Anti-Malware Profile
SRX Series Firewalls leverage the insights from Juniper Advanced Threat Prevention Cloud (Juniper ATP Cloud) to counteract malevolent content through security regulations. The anti-malware profile characterizes which materials to inspect for malware and determines the procedure upon its detection. Employing a staged methodology, Juniper ATP Cloud scrutinizes and identifies malware efficiently. Discovery of malware by the analysis suspends subsequent examination processes in the pipeline. In accordance with set configurations, security directives preclude the delivery of such harmful content to the intended recipient.
-
Select SRX > Security Subscriptions
> Anti-malware.
The Anti-malware page is displayed.
-
Click +.
The Create Anti-malware Profile page is displayed.
- Complete the configuration according to the guidelines provided in Table 1.
-
Click OK to save the changes.
Table 1: Fields on the Create Anti-malware Profile Page Field
Description
Name
Enter a name for the anti-malware profile.
The name must be a unique string of alphanumeric, special characters and 64 characters maximum. Special characters such as & ( ) ] ? " # are not allowed.
Verdict threshold
Select a threshold value from the list.
The threshold value determines when a file is considered malware. If the cloud service returns a file verdict equal to or higher than the configured threshold, then that file is considered as malware.
Protocols
HTTP
Enable this option to inspect advanced anti-malware (AAMW) files downloaded by hosts through HTTP protocol. The AAMW files are then submitted to Juniper ATP Cloud for malware screening.
Once you enable this option, configure the following:
-
Action (known verdict)—Select Permit or Block action from the list based on the detected malware.
-
Action (unknown verdict)—Select Permit or Block action from the list based on the detected malware having a verdict of “unknown.”
-
Notification—Select one of the following options to permit or block actions based on detected malware:
-
Redirect URL—Enter HTTP URL redirection for a customized client notification based on detected malware with the block action.
-
Redirect message—Enter the message for a customized client notification based on detected malware with the block action.
Range: 1 through 1023
-
File name—Click Browse to upload a customized file to which users will be directed. The files must be in .php, .html, or .py format and the files will be stored in /jail/var/tmp.
-
-
Inspection profile—Select a Juniper ATP Cloud profile name from the list. The Juniper ATP Cloud profile defines the types of files to scan.
To view the default and other inspection profiles on the SRX device, your device must be enrolled with Juniper ATP Cloud.
-
Logs—Enable this option to add the event to the log file.
IMAP
Enable this option to inspect and manage email attachments sent over IMAP email management.
Once you enable this option, configure the following:
-
Inspection profile—Select a Juniper Advanced Threat Prevention (ATP) Cloud profile name from the list. The ATP Cloud profile defines the types of files to scan.
To view the default and other inspection profiles on the SRX device, your device must be enrolled with Juniper ATP Cloud.
-
Logs—Enable this option to add the event to the log file.
SMB
Enable this option to inspect files downloaded by hosts through Server Message Block (SMB) protocol. SMB protocol enables applications or users to access files and other resources on a remote server.
Once you enable this option, configure the following:
-
Action—Select Permit or Block action from the list based on the downloaded files.
-
Inspection profile—Select a Juniper Advanced Threat Prevention (ATP) Cloud profile name from the list. The ATP Cloud profile defines the types of files to scan.
To view the default and other inspection profiles on the SRX device, your device must be enrolled with Juniper ATP Cloud.
-
Logs—Enable this option to add the event to the log file.
SMTP
Enable this option to inspect and manage email attachments sent over SMTP email management.
Once you enable this option, configure the following:
-
Inspection profile—Select a Juniper Advanced Threat Prevention (ATP) Cloud profile name from the list. The ATP Cloud profile defines the types of files to scan.
To view the default and other inspection profiles on the SRX device, your device must be enrolled with Juniper ATP Cloud.
-
Logs—Enable this option to add the event to the log file.
Fallback Actions
Global fallback action
Select None, Permit, or Block action from the list to permit or block the file regardless of its threat level.
Logs
Enable this option to add the event to the log file.
Specific Fallback Configurations
-
Invalid content size:
-
Select None, Permit, or Block action from the list if the content size exceeds the supported range (32 MB).
-
Logs—Enable this option to add the event to the log file.
-
-
Out of resource action
-
Select None, Permit, or Block action from the list if the service is out of resources.
-
Logs—Enable this option to add the event to the log file.
-
-
Service not ready action
-
Select None, Permit, or Block action from the list if the service is not yet ready.
-
Logs—Enable this option to add the event to the log file.
-
-
Submission timeout action
-
Select None, Permit, or Block action from the list if the submission is timed out.
-
Logs—Enable this option to add the event to the log file.
-
-
Unknown file action:
-
Select None, Permit, or Block action from the list if the file type is unknown.
-
Logs—Enable this option to add the event to the log file.
-
-
Verdict timeout action
-
Select None, Permit, or Block action from the list if the verdict response is timed out.
-
Logs—Enable this option to add the event to the log file.
-
Additional Logging
Files under verdict threshold
Enable this option to create a system log entry when the file verdict number is less than the threshold.
Blocklist
Enable this option to create a system log entry when an attempt is made to access that are listed in the blocklist.
Allowlist
Enable this option to create a system log entry when an attempt is made to access that are listed in the allowlist.
-