Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

March, 2018 Release

New and Changed Features: March, 2018

Support added for APAC and Canada Web Portal locations.

Host names vary by location as described in the following table:

Table 1: Support for APAC and Canada Web Portal locations
Location Juniper Sky ATP URL

United States

Customer Portal: https://amer.sky.junipersecurity.net

Open API (infected hosts, whitelist/blacklist, sample submission): https://api.sky.junipersecurity.net

Open API (threat intelligence): https://threat-api.sky.junipersecurity.net

European Union

Customer Portal: https://euapac.sky.junipersecurity.net

Open API (infected hosts, whitelist/blacklist, sample submission): https://api-eu.sky.junipersecurity.net

Open API (threat intelligence): https://threat-api.sky.junipersecurity.net

APAC

Customer Portal: https://apac.sky.junipersecurity.net

Open API (infected hosts, whitelist/blacklist, sample submission): https://api-apac.sky.junipersecurity.net

Open API (threat intelligence): https://threat-api-apac.sky.junipersecurity.net

Canada

Customer Portal: https://canada.sky.junipersecurity.net

Open API (infected hosts, whitelist/blacklist, sample submission): https://api-canada.sky.junipersecurity.net

Open API (threat intelligence): https://threat-api-canada.sky.junipersecurity.net

Hash File Support

Hash files are now supported for blacklist and whitelist file scanning. A hash is a unique signature for a file generated by an algorithm. You can add custom whitelist and blacklist hashes for filtering by listing them in a text file, with each entry on a single line, and uploading the file. Configure this through Configure > File Inspection Management > Whitelists or Blacklists. Click the Hash File tab.

Telemetry Data

(Support starting in Junos OS 17.4R1) The Telemetry page, located under Monitor > Telemetry > Web Protocols or Email Protocols, provides comprehensive monitoring information of devices for a variety of activities, including the number of web and email files scanned or blocked on a per protocol basis.

Role-Based Access Control

When you create or edit users on the Web Portal, you can assign a role to each user to determine his or her level of access to configurations. Available roles are System Administrator, Operator, and Observer. Access the Role Assignment pulldown field from Administration > Users. Then select a user to edit or click + to add a new user and select the role from the available pulldown field.