techdocs.broadcom.com
Open in
urlscan Pro
104.18.5.158
Public Scan
URL:
https://techdocs.broadcom.com/us/en/symantec-security-software/web-and-network-security/content-analysis/3-0/Solution_AV_scan/...
Submission: On October 21 via manual — Scanned from DE
Submission: On October 21 via manual — Scanned from DE
Form analysis
3 forms found in the DOMGET https://www.broadcom.com/site-search
<form class="form-inline d-lg-block predictive-search-form collapse" id="header-search-control" role="search" method="GET" action="https://www.broadcom.com/site-search">
<div class="autocomplete">
<input class="form-control predictive-search ui-autocomplete-input" type="search" placeholder="SEARCH" aria-label="Search" id="bcAppSearch" name="q" autocomplete="off">
<button role="button" aria-label="Search" class="fa fa-search my-sm-0" type="submit"></button>
</div>
</form>
GET https://www.broadcom.com/site-search
<form class="form-inline my-2 pt-lg-3 predictive-search-form d-none" id="bcAppMobSearchForm" role="search" method="GET" action="https://www.broadcom.com/site-search">
<div class="autocomplete">
<div class="dropdown">
<button role="button" aria-label="Search" class="fa fa-search my-2 my-sm-0 dropdown-toggle" data-toggle="dropdown" aria-expanded="false"></button>
<div class="dropdown-menu">
<input class="form-control predictive-search ui-autocomplete-input" type="search" placeholder="Search" aria-label="Search" id="bcAppMobSearch" name="q" autocomplete="off">
</div>
</div>
</div>
</form>
GET /us/en/symantec-security-software/web-and-network-security/content-analysis/3-0/search.html
<form action="/us/en/symantec-security-software/web-and-network-security/content-analysis/3-0/search.html" method="GET" class="product-landing-search-form" role="search" data-call-analytics="true">
<button type="submit" aria-label="Search" class="fa fa-search product-landing-search-icon"></button>
<input type="text" id="product-landing-search" name="q" placeholder="Search this product" aria-label="Search this product. When autocomplete results are available use up and down arrows to review and enter to select." autocomplete="off"
data-searchlink="/content/broadcom/techdocs/us/en/symantec-security-software/web-and-network-security/content-analysis/3-0/search.html" data-sitetitle="Content Analysis - 3.0" data-pagename="Manually Define File Reputation "
class="ui-autocomplete-input">
</form>
Text Content
MENU * Products * Solutions * Support * Company * How to Buy * Login myBroadcom Account: Login Register Forgot Username/Password? * Username Edit My Profile myBroadcom Logout * Language * English * 日本語 * 中文 * Login myBroadcom Account: Login Register Forgot Username/Password? * Username Edit My Profile myBroadcom Logout * English 日本語 中文 * Home * Symantec Security Software * Web and Network Security * Content Analysis - 3.0 * Prepare to Scan for Malware * Manually Define File Reputation CONTENT ANALYSIS - 3.0 PDF Version 3.0 3.1 3.0 2.4 2.3 English English Open/Close Topics Navigation Product Menu TOPICS * About Content Analysis 3.0 * New Features in Content Analysis 3.0.1.1 * Content Analysis Caches * Virtual Appliance Installation * Verify VMware Requirements * Verify System Requirements * Verify Resource Availability * Prepare for Initial Configuration * Retrieve Your Serial Number * Set Up Content Analysis * Download and Extract the VAP File * Create the Virtual Appliance Using vSphere Client * Create the Virtual Appliance * Enter Your Serial Number * Configure the Virtual Appliance * Access the Web Management Console * Install the VA Appliance Certificate and License * Configure Explicit Proxy * Log In to the CLI * Prevent Licensing Issues * Deploy Content Analysis on AWS * Complete Prerequisite Tasks * Import and Register an AMI * Deploy the Instance * Install the License * Disassociate User Data from the Instance * First Steps * Content Analysis Security Best Practices * Required Ports, Protocols, and Services * Proxy Connections Through a Gateway Device * Route Traffic to Alternate Networks * IPv6 in Content Analysis * License Content Analysis * Set the Appliance Hostname * Synchronize the System Clock with NTP * Set the Date/Time Manually * Set the Time Zone * Content Analysis Home Page * Prepare to Scan for Malware * Activate Licensed Components * Define File Type Policy * Improve Malware Scanning Results with Predictive Analysis * Set AV Scanning Behavior Options * Manually Scan Files for Threats * File Reputation Service * Manually Define File Reputation * Drop Slow Download Connections * Integrations * About Malware * The Symantec Threat Protection Solution * Supported Anti-Malware Engines * Scanning Services: RESPMOD vs. REQMOD * Communication Between the ProxySG and Content Analysis Appliances * Deployment * Deployment Guidelines * One ProxySG to One Content Analysis Appliance * Redundant Appliance Topologies * Deployment Workflow * Configure and Install the ProxySG Appliance * Configure and Install the Content Analysis Appliance * Install and Configure the Malware Analysis Appliance * Configure Symantec Appliances to Communicate * Enable Secure ICAP Connections * Add CAS Certificate to ProxySG * Configure ICAP Policy on a ProxySG Appliance * Automatically Configure an ICAP Service on the ProxySG * Manually Configure an ICAP Service on the ProxySG * Configure ICAP Policy * Configure Scanning Exemption Policies * Test the Threat Protection Policy * Configure Malware Analysis * Monitor ICAP Scanning * Display ICAP Graphs and Statistics on the ProxySG * Display Content Analysis ICAP Graphs on the ProxySG * Display ICAP Statistical Data * Monitor ICAP-Enabled Sessions on the ProxySG * View Statistics on the Content Analysis Appliance * View Malware Reports in Symantec Management Center and Reporter * Fine-Tune the Configuration * Improve the User Experience * Patience Pages * Data Trickling * Deciding Between Data Trickling and Patience Pages * Deferred Scanning * Configure ICAP Feedback * Enable Deferred Scanning * Configure Email Alerts * Customize the Malware Scanning Policy * Create User-Based ICAP Policy * Enable Web Authentication * Create Authorization Rules * Implement a Request Modification ICAP Service * Create an ICAP Request Service * Create an ICAP Request Policy - Forward Proxy/DLP * Load Balance Multiple Content Analysis Appliances * Specify Weight within an ICAP Service Group * Create Load Balancing Policy * Configure Content Analysis Failover * Create Content Analysis Failover Policy * Configuration Best Practices * Conserve Scanning Resources * Scan-and-Serve Policy Using Mirroring * Avoid Processing of Canceled Connections * Antivirus Scanning Best Practices * Sandboxing Best Practices * Troubleshoot ProxySG and Content Analysis Integration Problems * Content Analysis is not scanning web traffic * Users cannot access any websites * ProxySG runs out of memory during heavy traffic load * Scans are taking too long * Virus counts do not include cached responses * Vendor exception pages are outdated * Content Analysis is not getting virus updates * Firefox bypasses Content Analysisprocessing * Integrate with Symantec Messaging Gateway * About Sandboxing * Sandbox Suspicious Files * About On-Box Sandboxing * Use On-box Sandboxing * Enable On-Box Sandboxing on CA VA and S200 * Enable On-Box Sandboxing on CA S400 and S500 * Optimize Resources for On-Box Sandboxing * Add Windows ISO File * Add Windows Base Image * Add and Customize IVM Profiles * Transfer Installation Files to an IVM * Templates for Customizing a Windows 7 IVM Profile * Specify Task Firewall Type * Configure Task Settings * Configure the Dirty Line Network * Copy iVM Profiles onto Multiple Appliances * Configure a Symantec Malware Analysis Sandbox * Perform Sandbox Analysis in the Cloud * Configure a FireEye Sandbox * Configure a Lastline Sandbox * Configure Sandbox General Settings * Configure Sandbox Archive Policies * Configure Sandbox Cache Settings * Integrate with Symantec Endpoint Protection Manager * Configure CounterTack Sentinel Endpoint Security Verification and Reporting * Orchestration * Activate the VirusTotal Service * Use the Web Reputation Service * Use Advanced On-Box Sandboxing Features * Configure Sandbox Reporting * Send Sandboxing Results to Symantec Reporter * Report Malware to Symantec GIN * Content Analysis Reporting * Malware Processing Reports * Monitor Threat Activity in Statistics Overview * View the Sandboxing Report * Send System Statistics by Email * View the Predictive Analysis Report * View the File Reputation Report * View the Whitelist and Blacklist Reports * View Recent Threats Reports * View Cache Hits * View Number of Objects Scanned * View Number of Bytes Scanned * Connection Reports * View Scanning Connections * View Current Scanning Connections * View Historical Scanning Connections * Reports about the Appliance * View the CPU/Memory Usage * View Ethernet Adapter Statistics * Perform Malware Analysis * Malware Analysis Overview Dashboard * Malware Analysis Processing Statistics * Submit a Sample File for Analysis * Submit a ZIP File Sample * Submit a URL for Analysis * Detect Malware by URL Category * Create a Task for a Sample * View Your Submitted Samples * View All Samples * Get Sample Details * View Tasks You Have Created * View All Tasks * View Task Summary Results * View Task Behaviors in the Dynamic Event List * View Static Task Events * View Task Events over Time * Search Malware Analysis Tasks * About Patterns * Identify Malware Patterns * View Pattern Group Details * Filter the Pattern List * Pattern Group Prefixes * About YARA * Apply YARA Rules * About HTTP Archive (HAR) * About IVM Plugins * Administrative Tasks * Manage Administrator Access * Authenticate Users with Local Credentials * Manage Certificates for HTTPS Access * Mutual SSL Authentication (Web Browser) * Import a Private Key for OpenSSL * Authenticate Administrators with LDAP * Authenticate Administrators with RADIUS * Control Access to the Management Console * Modify the Session Timeout Value * Define an Administrative Login Message * Configure Alerts * Set Up Alert Delivery Methods * Configure E-Mail Settings * Configure SNMP Traps * Configure Syslog Alerts * Customize Alert Messages * Manage the Appliance Licenses and Subscriptions * Update Antivirus Pattern Files * Symantec Antivirus Updates in a Closed Network * Update Detection Patterns * Install a New System Image * Manage the System Logs * Configure SNMP * Set the System Log Parameters * Review System Activities * Archive or Restore the System Configuration * Back Up and Restore * Troubleshooting and Support * Malware Analysis System Information * Check System Health * Review System Activities * Review the Web Logs * Manually Scan Files for Threats * Troubleshoot ICAP Errors * Troubleshooting Windows Image Upload/Download Issues * Send Diagnostic Information to Symantec Support * Clear File Caches * Onboard Diagnostics * Inspect Traffic * Restart System Services * Generate Core Dumps * Reboot Corrupted System with Another Image * Test Network Connectivity * View and Export the System Information File * Product Information * Powering On the Content Analysis Appliance * Upgrade the Content Analysis Image * Content Analysis Hardware and Software Requirements * Content Analysis Product Specifications * About Content Analysis RAID * System Telemetry — Anonymous Usage Data * CLI Commands * Access the Command-Line Interface * Command Line Overview * Standard Mode Commands * enable * quit * show * show raid * Enable Mode Commands * clear-cache * clock * configure * diagnostics * diagnostic-systems * disable * display-level * exit * halt * history * installed-systems * logout * ma-actions * ma-actions api-key * ma-actions bases imports download * ma-actions bases imports import * ma-actions bases list * ma-actions profiles exports * ma-actions profiles imports download * ma-actions profiles imports import * ma-actions profiles list * pcap * ping * restart * restart icap-service * restart licensing * restart-snmp * restart web-management * restore-defaults * send * send-test-alert * services * shutdown * statistics * test-service * traceroute * upload * Configure Mode Commands * alerts * alerts destinations * alerts email-alerts * alerts syslog-alerts * appliance-name * authentication * authentication certificate-auth * authentication edit local-user-list * authentication edit realm * authentication ldap * authentication radius * authentication local-lockout * cache * consent-banner * dns * filetype-policy * health-monitoring * health-monitoring metric * health-monitoring view * icap * icap access-list * icap secure * icap simple * ictm * ictm drop * ictm warning * interface * ip * licensing * licensing-telemetry * logging * ma-settings * ma-settings analysis * ma-settings analytics * ma-settings bootstrap * ma-settings cleanup * ma-settings health-settings * ma-settings ivm * ma-settings ivm customize * ma-settings ivm_watchdog * ma-settings main * ma-settings nexus * ma-settings nse * ma-settings rapi * ma-settings remote_syslog * ma-settings updates * ma-settings vtopd * ma-settings webpulse * message-templates * ntp * orchestration * password-policy * predictive-analysis * proxy-settings * reporter * sandboxing * sandboxing countertack * sandboxing fireeye * sandboxing lastline * sandboxing real-time * sandboxing security-analytics-settings * sandboxing symantec-cloud-sandbox * sandboxing symantec-endpoint-protection * sandboxing symantec-malware-analysis * services * services kaspersky * services mcafee * services policy * services sophos * services symantec * show * snmp * snmp agent * snmp community * snmp notify * snmp system * snmp target * snmp usm local * snmp usm remote * snmp vacm group access * snmp vacm group member * ssh generate * system * timezone * web-management * web-management http * web-management https * webpulse-feedback * Content Analysis APIs * Content Analysis API Architecture * Generate an API Key * Create an API Key * Lost API Keys * API Client Environment * Pass API Keys to REST API * REST API for Malware Analysis Operations * Common Malware Analysis API Functions * Create an API Key * Shut Down or Restart System * Submit Sample File * Submit Sample URL * Create Task * Get Task Statistics * Get a Sample's Tasks * Get Pattern Group * Retrieve Sample Tasks * Get Risk Score * Retrieve Matched Patterns * Retrieve Task Events * Retrieve Task Resources * Retrieve Sample Binary File * Search for a Sample * Search Tasks * Search by Task Field * Search for Task Reports * Search for Tasks by Sample * Scroll Through Tasks * Aggregate Search Task Results * Get Task Results Schema * Delete Task * Delete Sample * Fetch VirusTotal Data * Get Status of Queues * Get Health State * Get Database Counts * List Current Sessions * Download Windows Base Image * Pull Windows Base Image from URL * Upload Windows Base Image * Pull Windows ISO from URL * Upload Windows ISO File * Install a Multi-Edition ISO File * Export iVM Profile * Get Exported IVM Profile Metadata * Download Exported iVM Profile * Import IVM Profile * Pub-Sub API for Notifications * Pass API Keys to the Pub-Sub API * WebSockets and Commands * task_complete * task_state * Task States * syslog * health * Sample Use Cases for Pub-Sub API * Resubmit Dropped Files * Download PCAP for Network Traffic Analysis * Conditional Processing * REST API for File Submission * Step 1: Generate an API Key * Step 2: Subscribe to the WebSocket * Step 3: Select IVM Profile * Step 4: Submit Files for Evaluation * Appendix A: Asynchronous Response Syntax * Appendix B: POST Response Syntax * Appendix C: Sample JSON * Appendix D: Example Python Scripts * Example Python Code: WebSocket Task_Complete Notifications * Example Python Code: Submit Files to Content Analysis * Example Python Code: WebSocket Scan Notifications * Copyright Statement MANUALLY DEFINE FILE REPUTATION LAST UPDATED SEPTEMBER 21, 2021 To prevent unnecessary scanning and analysis on files for which your organization has identified a reputation, you can add a SHA1 or SHA256 hash to Content Analysis with the manual Whitelist/Blacklist configuration page. This service requires no additional subscription license; it is included with the base license for the appliance. During file processing, Content Analysis will check these lists before reaching out to the cloud-based File Reputation service. Unlike the cloud service, the manual whitelist/blacklist configuration results in either an allow or deny, with no further analysis. If the hash exists in either list, the file will either be permitted without further analysis (whitelist) or denied without further processing (blacklist). To report false positives visit this link: https://symsubmit.symantec.com/ Show screen... This feature is based on the SHA1 and SHA256 hash of files. You can use your favorite third party tools (web-based and offline) to generate a SHA1 or SHA256 hash to use in your whitelist/blacklist configuration. SEARCH FOR KNOWN FILE HASHES If you're not sure if the file you're looking to block or allow has been added to Content Analysis before, you can search each reputation list. Select Services > Whitelist/Blacklist . Paste the SHA1 hash for a file in the Search for Hash field in either the whitelist or blacklist. Click Search . The Search Results dialog appears. If the search finds the supplied hash in the selected list, the Search Results dialog will advise that the hash exists in the custom blacklist or whitelist. If you wish to remove the file from the selected list, click Remove in the Search Results dialog. If the search does not locate the hash in the selected list, the Search Results dialog will advise that the hash does not exist in the custom blacklist or whitelist. If you wish to add the file to the selected list, click Add in the Search Results dialog. (Optional) When prompted, add a comment to identify the submission. ADD A FILE HASH TO FILE REPUTATION LISTS If you know that the a hash does not exist in the file reputation list you are working with, you can add it. Paste the SHA1 hash for a file to either Add Hash to Blacklist or Add Hash to Whitelist fields, depending on whether you would like to block or allow user access to this file in future download attempts. Optional — When prompted, add a comment to identify the submission. If the file is already in the hash reputation list, Content Analysis displays an error message. EXPORT THE HASH BLACKLIST OR WHITELIST TO A FILE Whenever you make changes to either hash reputation list, it's a good idea to back up that list. Perform that backup with Export . Under Bulk Operations in either the Blacklist or Whitelist section, click Export . You are prompted to save a CSV file containing your hash reputation list. The CSV file is named either blacklist or whitelist, followed by the date (for example, blacklist_ 2020 -12-01.csv ). IMPORT THE HASH BLACKLIST OR WHITELIST FROM A FILE If you have a file reputation list that you have previously saved, you can import it into Content Analysis . Under Bulk Operations in either the Blacklist or Whitelist section, click Import . You are prompted to browse for a CSV. Locate the desired file and click Open . When the upload is complete, the browser displays a confirmation dialog. Prepare to Scan for Malware Comments Please log in to post comments. * * * * * Products * Solutions * Support * Company * How to Buy Copyright © 2005-2021 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. * Privacy * Supplier Responsibility * Terms of Use * Sitemap * * * * PRIVACY PREFERENCE CENTER * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES YOUR PRIVACY When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalised web experience. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. BACK BUTTON BACK Vendor Search Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All By clicking accept, you understand that we use cookies to improve your experience on our website. For more details, please see our Cookie Policy. Cookies Settings Accept Cookies