This section provides an example to explain how to configure to submit samples to the Cloud Virtual Analyzer for suspicious object analysis and how to utilize the suspicious objects obtained from the Cloud Virtual Analyzer and Apex Central for threat scanning in TMWS policies.
-
The admin configures to enable Cloud Virtual Analyzer
and Action on Suspicious Objects in Threat
Protection and apply it in Cloud Access
Rules.
-
TMWS submits a sample
file to the Cloud Virtual Analyzer, which then generates suspicious objects
after analysis.
- User A that matches Cloud Access Rule 1 uploads, opens, or downloads a file that matches the criteria set in Threat Protection Template 1.
- The file is sent as a sample to the Cloud Virtual Analyzer for analysis.
- The Cloud Virtual Analyzer generates a blocked list containing suspicious objects derived from the file, and sends it to TMWS, which displays them on the Suspicious Objects screen.
- Apex Central automatically synchronizes the latest suspicious objects with TMWS at a scheduled time interval.
-
TMWS automatically
detects access to requested web traffic that contains a suspicious object, and
blocks or monitors this web activity.
- User B initiates an HTTP/HTTPS request to access web traffic that contains a suspicious object displayed and enabled on the Suspicious Objects screen.
- User B matches an enabled cloud access rule, which uses a Threat Protection template with Action on Suspicious Objects configured.
- TMWS blocks or monitors this web activity according to the action set in the applied Threat Protection template.