Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

HTTP File Download Overview

Access the HTTP File Download page from the Monitor > Files > HTTP File Downloads menu.

Benefits of viewing HTTP File Downloads

  • Allows you to view a compiled list of suspicious downloaded files all in one place, including the signature, threat level, URL, and malware type.

  • Allows you to filter the list of downloaded files by individual categories.

Export Data—Click the Export button to download file scanning data to a CSV file. You are prompted to narrow the data download to a selected time-frame.

Figure 1: HTTP File Downloads HTTP File Downloads

The following information is available on this page.

Table 1: HTTP Scanning Data Fields

Field

Definition

Detection Engine

Displays color-coded icons representing the confidence levels of various detection engines in identifying threats.

For more information more detection engines, see Table 2.

The color codes signify the following threat severities:

  • Red—High threat severity

  • Orange—Moderate threat severity

  • Green—Low threat severity

  • Gray—No threats detected

To view the threat severity score assigned by each detection engine, hover over the icons.

Signature ID / SHA-256 / ML Hit

If applicable, the Signature ID uniquely identifies the signature that is triggered for this detection; otherwise, the SHA-256 file hash is displayed.

  • If a full file is uploaded to the Juniper ATP Cloud, a hash of the file is displayed in this column.

  • If the file is blocked, and the transfer is interrupted on the SRX Series Firewall, a Signature ID is displayed.

  • If the file is detected by the inline machine learning (ML)-based threat detection engine on the SRX Series Firewall, "N/A" is displayed in this column.

Threat Level

The threat score. Click the three vertical dots at the top of the column to filter the information in the page by threat level.

Filename

The name of the file, including the extension

Last Submitted

The time and date of the most recent file scan

URL

The URL from which the file originated

Malware Name

The name of file and the type of threat if the verdict is positive for malware. Examples: Trojan, Application, Adware. If the file is not malware, the verdict is "clean."

Category

The type of file

Examples: PDF, executable, document

Table 2: Detection Engines

Detection Engines

Description

Antivirus

  • Commercial antivirus

  • Commercial cloud multi-antivirus engine

Dynamic ML

  • Juniper’s sandbox-based ML

  • Juniper’s cloud sandbox-based ML

Static ML
  • Juniper’s cloud ML antivirus

  • Juniper’s ML engines using file attributes

  • Commercial cloud static antivirus

Reputation

File hash reputation