Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Allowlists Overview

An allowlist contains known trusted IP addresses, hashes, email addresses, and URLs. Content downloaded from such endpoints are not scanned for malware.

Allowlists support the following types:

  • Anti-malware—IP address, URL, file hash, and e-mail sender.

  • SecIntel—IP address and domain

  • ETI—IP address and hostname

  • DNS—Domains

  • Reverse Shell—IP address and domain name.

Note:
  • For IP addresses and URLs, the web GUI performs basic syntax checks to validate the entries.

  • A hash is a unique signature for a file that is generated by an algorithm. You can add custom allowlist hashes for filtering in a TXT file with each entry on a single line. You can only have one running file with a maximum of 15,000 file hashes.

Juniper Secure Edge makes requests every two hours for new and updated feed content.

Benefits of Allowlists

Allows users to download files from sources that are known to be safe. Allowlist can be added to in order to decrease false positives.