Malware Download Protection

Automatically inspect and block malicious file downloads at the edge

  • Updated on
  • 7 minutes to read
  • Contributors

Overview

Malware Download Protection adds real-time file inspection for users that have an Internet Threat Protection (ITP) policy applied to their devices. When enabled, files downloaded through the Secure Web Gateway (SWG) are automatically analyzed for malware before they reach the endpoint. Malicious or suspicious files are blocked, and the end user is notified immediately.

This feature can be enabled on a per-policy basis, giving admins granular control over which users and device groups are protected.

Pre-requisites

  • mac or Windows device
  • SIA advanced license
  • ITP policy associated with your device
  • Desktop app version 4.2.0 or later

How It Works

For Admins

Malware Download Protection is configured in the CSE admin console at the ITP policy level. When the feature is enabled, the following occurs:

  1. SSL decryption is activated for devices assigned to the ITP policy.
  2. Supported file types downloaded through the SWG agent are inspected for malware.
  3. Files identified as malicious are blocked, and a blocked event is generated in the console;
  4. Files that pass inspection are delivered to the user.

Note: Files downloaded from bypassed domains or URLs on your allowlist are not inspected.

For End Users

Malware Download Protection works transparently in the background. In most cases, downloads complete normally with no noticeable delay. Here are the file statuses:

File Status Outcome
File passes static analysis The file downloads automatically. No notification is shown. Processing typically takes less than two seconds.
File is sent for dynamic analysis You’ll see an OS notification and a system tray indicator letting you know the file is being analyzed.
File is blocked You’ll receive an OS notification that the file has been blocked. Clicking the notification opens the CSE app.
File passes dynamic analysis The file downloads automatically once analysis is complete.

File Center

The CSE desktop app includes a new File Center tab where you can view the status of files that have been inspected. This is where blocked files and files currently under analysis will appear.

Field Description
Status Whether the file is under analysis, blocked, or allowed
Source The URL from which the file was downloaded
File Name Name of the downloaded file
Time When the download was intercepted and analysis began
File Size Size of the file (available in expanded view)
File Type The type of file downloaded (available in expanded view)
File Hash SHA-256 hash of the file (available in expanded view)
Request ID Unique identifier for the request (available in expanded view)

Search the File Center by source URL or file name to quickly find specific downloads.


Exceptions and Bypasses

There are several ways files can be excluded from malware inspection:

Exception Type Details
Domain Bypass Traffic to bypassed domains is not intercepted by CSE and, thus, not inspected.
URL Allowlist Files downloaded from allowed URLs are not inspected.

Events and Logging

Console Events

Blocked downloads generate events in the Internet Access section of the CSE console. A dedicated Malware Analysis filter allows you to quickly isolate these events. Note that allowed downloads do not generate console events, but are recorded in the monthly access logs.


Supported File Types

The following file types are inspected when downloaded through the SWG. They are grouped into three categories: executables and packages, productivity and document formats, and archives and compression formats.

Executables and Packages
File Format Extensions
Portable executables (PE) .exe, .dll, .sys, .scr, .cpl
Mach-O files .app, .dylib (macOS executables)
Disk images .dmg, .iso
ELF files Linux executables and shared libraries
Android packages .apk
Java archives .jar
Windows installers .msi
Productivity and Documents
File Format Extensions
Microsoft Word documents .doc, .docx
Microsoft Excel spreadsheets and binary workbooks .xls, .xlsx, .xlsb
Microsoft PowerPoint presentations .pptx
Microsoft OneNote section files .one
Office Open XML files .docx, .xlsx, .pptx (and other OOXML formats)
Outlook messages .msg
Adobe Acrobat PDF files .pdf
Windows thumbnail cache thumbs.db
Archives and Compression
File Format Extensions
RAR archives .rar
ZIP archives .zip
7-Zip archives .7z
gzip compressed files .gz, .tgz
bzip2 compressed files .bz2
xz compressed files .xz
ACE compressed files .ace

Notification Reference

Below are the notifications end users may see when Malware Download Protection is active.

Notification Message
File submitted for analysis <Filename> has been submitted for analysis.
File blocked <Filename> has been blocked as malware. If you believe this to be incorrect, please contact your administrator.

Steps to Enable Malware Download Inspection:

1. In the CSE Command Center, navigate from Internet Access > Internet Threat Protection > Policies. Select an existing policy or select + Create Policy. If you select an existing policy, select the Edit icon.

2. Navigate to Advanced Protection in your policy configuration, and toggle on File Analysis.

3. Save your policy configuration.