ICAP Header Responses Parent topic

For each sample submitted by ICAP clients, Deep Discovery Analyzer returns the following ICAP headers.
ICAP Headers
Values
Examples
Server
Deep Discovery Analyzer version and build number
Server: Deep Discovery Analyzer 6.0 Build 1202
ISTag
Version of the Advanced Threat Scan Engine for Deep Discovery (Linux, 64-bit) component
This is used to validate that previous Deep Discovery Analyzer responses can still be considered fresh by an ICAP client that may still be caching them.
ISTag: "10.300.1021"
Encapsulated
The offset of each encapsulated section's start relative to the start of the encapsulating message's body
Encapsulated: req-hdr=0, req-body=147
Date
The date time value provided by the Deep Discovery Analyzer clock, specified as an RFC 1123 compliant date/time string
Date: Thu, 04 Jan 2018 02:33:04 GMT
The following table describes the additional headers that Deep Discovery Analyzer returns.
Note
Note
If enabled, Deep Discovery Analyzer always returns the X-Response-Desc header, and only returns the X-Virus-ID and X-Infection-Found headers when a known threat is detected during the pre-scanning of samples received from ICAP clients.
ICAP Headers
Values
Examples
X-Virus-ID
One line of US-ASCII text with the name of the virus or risk encountered
X-Virus-ID: TSPY_ONLINEG.MCS
X-Infection-Found
Numeric code for the type of infection, the resolution, and the risk description
X-Infection-Found: Type=0; Resolution=2; Threat=TSPY_ONLINEG.MCS;
X-Response-Desc
Reason Deep Discovery Analyzer considers a URL or file sample as malicous or safe
X-Response-Desc: URL: No risk rating from WRS; FILE: Detected by ATSE
Note
Note
To enable these headers and configure other ICAP settings, go to AdministrationIntegrated Products/Services ICAP.
For details, see Configuring ICAP Settings.
For more details about ICAP headers, refer to the following site: