March, 2018 Release
New and Changed Features: March, 2018
- Support added for APAC and Canada Web Portal locations.
- Hash File Support
- Telemetry Data
- Role-Based Access Control
Support added for APAC and Canada Web Portal locations.
Host names vary by location as described in the following table:
Location | Juniper Sky ATP URL |
---|---|
United States |
Customer Portal: https://amer.sky.junipersecurity.net Open API (infected hosts, whitelist/blacklist, sample submission): https://api.sky.junipersecurity.net Open API (threat intelligence): https://threat-api.sky.junipersecurity.net |
European Union |
Customer Portal: https://euapac.sky.junipersecurity.net Open API (infected hosts, whitelist/blacklist, sample submission): https://api-eu.sky.junipersecurity.net Open API (threat intelligence): https://threat-api.sky.junipersecurity.net |
APAC |
Customer Portal: https://apac.sky.junipersecurity.net Open API (infected hosts, whitelist/blacklist, sample submission): https://api-apac.sky.junipersecurity.net Open API (threat intelligence): https://threat-api-apac.sky.junipersecurity.net |
Canada |
Customer Portal: https://canada.sky.junipersecurity.net Open API (infected hosts, whitelist/blacklist, sample submission): https://api-canada.sky.junipersecurity.net Open API (threat intelligence): https://threat-api-canada.sky.junipersecurity.net |
Hash File Support
Hash files are now supported for blacklist and whitelist file scanning. A hash is a unique signature for a file generated by an algorithm. You can add custom whitelist and blacklist hashes for filtering by listing them in a text file, with each entry on a single line, and uploading the file. Configure this through Configure > File Inspection Management > Whitelists or Blacklists. Click the Hash File tab.
Telemetry Data
(Support starting in Junos OS 17.4R1) The Telemetry page, located under Monitor > Telemetry > Web Protocols or Email Protocols, provides comprehensive monitoring information of devices for a variety of activities, including the number of web and email files scanned or blocked on a per protocol basis.
Role-Based Access Control
When you create or edit users on the Web Portal, you can assign a role to each user to determine his or her level of access to configurations. Available roles are System Administrator, Operator, and Observer. Access the Role Assignment pulldown field from Administration > Users. Then select a user to edit or click + to add a new user and select the role from the available pulldown field.