Malware Download Protection
Automatically inspect and block malicious file downloads at the edge
- Overview
- Pre-requisites
- How It Works
- File Center
- Exceptions and Bypasses
- Events and Logging
- Supported File Types
- Notification Reference
- Steps to Enable Malware Download Inspection:
Overview
Malware Download Protection adds real-time file inspection for users that have an Internet Threat Protection (ITP) policy applied to their devices. When enabled, files downloaded through the Secure Web Gateway (SWG) are automatically analyzed for malware before they reach the endpoint. Malicious or suspicious files are blocked, and the end user is notified immediately.
This feature can be enabled on a per-policy basis, giving admins granular control over which users and device groups are protected.
Pre-requisites
- mac or Windows device
- SIA advanced license
- ITP policy associated with your device
- Desktop app version
4.2.0or later
How It Works
For Admins
Malware Download Protection is configured in the CSE admin console at the ITP policy level. When the feature is enabled, the following occurs:
- SSL decryption is activated for devices assigned to the ITP policy.
- Supported file types downloaded through the SWG agent are inspected for malware.
- Files identified as malicious are blocked, and a blocked event is generated in the console;
- Files that pass inspection are delivered to the user.
Note: Files downloaded from bypassed domains or URLs on your allowlist are not inspected.
For End Users
Malware Download Protection works transparently in the background. In most cases, downloads complete normally with no noticeable delay. Here are the file statuses:
| File Status | Outcome |
|---|---|
| File passes static analysis | The file downloads automatically. No notification is shown. Processing typically takes less than two seconds. |
| File is sent for dynamic analysis | You’ll see an OS notification and a system tray indicator letting you know the file is being analyzed. |
| File is blocked | You’ll receive an OS notification that the file has been blocked. Clicking the notification opens the CSE app. |
| File passes dynamic analysis | The file downloads automatically once analysis is complete. |
File Center
The CSE desktop app includes a new File Center tab where you can view the status of files that have been inspected. This is where blocked files and files currently under analysis will appear.
| Field | Description |
|---|---|
| Status | Whether the file is under analysis, blocked, or allowed |
| Source | The URL from which the file was downloaded |
| File Name | Name of the downloaded file |
| Time | When the download was intercepted and analysis began |
| File Size | Size of the file (available in expanded view) |
| File Type | The type of file downloaded (available in expanded view) |
| File Hash | SHA-256 hash of the file (available in expanded view) |
| Request ID | Unique identifier for the request (available in expanded view) |
Search the File Center by source URL or file name to quickly find specific downloads.
Exceptions and Bypasses
There are several ways files can be excluded from malware inspection:
| Exception Type | Details |
|---|---|
| Domain Bypass | Traffic to bypassed domains is not intercepted by CSE and, thus, not inspected. |
| URL Allowlist | Files downloaded from allowed URLs are not inspected. |
Events and Logging
Console Events
Blocked downloads generate events in the Internet Access section of the CSE console. A dedicated Malware Analysis filter allows you to quickly isolate these events. Note that allowed downloads do not generate console events, but are recorded in the monthly access logs.
Supported File Types
The following file types are inspected when downloaded through the SWG. They are grouped into three categories: executables and packages, productivity and document formats, and archives and compression formats.
Executables and Packages
| File Format | Extensions |
|---|---|
| Portable executables (PE) | .exe, .dll, .sys, .scr, .cpl |
| Mach-O files | .app, .dylib (macOS executables) |
| Disk images | .dmg, .iso |
| ELF files | Linux executables and shared libraries |
| Android packages | .apk |
| Java archives | .jar |
| Windows installers | .msi |
Productivity and Documents
| File Format | Extensions |
|---|---|
| Microsoft Word documents | .doc, .docx |
| Microsoft Excel spreadsheets and binary workbooks | .xls, .xlsx, .xlsb |
| Microsoft PowerPoint presentations | .pptx |
| Microsoft OneNote section files | .one |
| Office Open XML files | .docx, .xlsx, .pptx (and other OOXML formats) |
| Outlook messages | .msg |
| Adobe Acrobat PDF files | |
| Windows thumbnail cache | thumbs.db |
Archives and Compression
| File Format | Extensions |
|---|---|
| RAR archives | .rar |
| ZIP archives | .zip |
| 7-Zip archives | .7z |
| gzip compressed files | .gz, .tgz |
| bzip2 compressed files | .bz2 |
| xz compressed files | .xz |
| ACE compressed files | .ace |
Notification Reference
Below are the notifications end users may see when Malware Download Protection is active.
| Notification | Message |
|---|---|
| File submitted for analysis | <Filename> has been submitted for analysis. |
| File blocked | <Filename> has been blocked as malware. If you believe this to be incorrect, please contact your administrator. |
Steps to Enable Malware Download Inspection:
1. In the CSE Command Center, navigate from Internet Access > Internet Threat Protection > Policies. Select an existing policy or select + Create Policy. If you select an existing policy, select the Edit icon.
2. Navigate to Advanced Protection in your policy configuration, and toggle on File Analysis.
3. Save your policy configuration.