This section provides an example to explain how to configure to submit
samples to the Cloud Virtual Analyzer for suspicious object analysis and how to
utilize the suspicious objects obtained from the Cloud Virtual Analyzer and Apex
Central for threat scanning in TMWS policies.
Procedure
- The admin configures to enable Cloud Virtual Analyzer
and Action on Suspicious Objects in Threat
Protection and apply it in Cloud Access
Rules.
- Go to , and create a new Threat Protection template or edit an existing one, for example, Threat Protection Template 1, as necessary.
- Enable the Cloud Virtual Analyzer in the Advanced Threat Scanning section.
- Enable Action on Suspicious Objects, set the
action for each suspicious object type upon detection, and then click
Save. For details, see Configuring A Threat Protection
TemplateThe action applies to each enabled suspicious object generated by the Cloud Virtual Analyzer or synchronized from Apex Central.
- Go to , and create a new cloud access rule or edit an existing one, for example, Cloud Access Rule 1, as necessary.
- Enable the cloud access rule, configure the Action section and the Security Templates section to select Threat Protection Template 1 configured in the preceding steps, and then click Save. For details, see Configuring A Cloud Access Rule.
- Go to and select the suspicious objects to be used by enabling or disabling them as required.
- TMWS submits a sample
file to the Cloud Virtual Analyzer, which then generates suspicious objects
after analysis.
- User A that matches Cloud Access Rule 1 uploads, opens, or downloads a file that matches the criteria set in Threat Protection Template 1.
- The file is sent as a sample to the Cloud Virtual Analyzer for analysis.
- The Cloud Virtual Analyzer generates a blocked list containing suspicious objects derived from the file, and sends it to TMWS, which displays them on the Suspicious Objects screen.
- Apex Central automatically synchronizes the latest suspicious objects with TMWS at a scheduled time interval.
- TMWS automatically
detects access to requested web traffic that contains a suspicious object, and
blocks or monitors this web activity.
- User B initiates an HTTP/HTTPS request to access web traffic that contains a suspicious object displayed and enabled on the Suspicious Objects screen.
- User B matches an enabled cloud access rule, which uses a Threat Protection template with Action on Suspicious Objects configured.
- TMWS blocks or monitors this web activity according to the action set in the applied Threat Protection template.