Configure when and which types of files are uploaded to the Barracuda ATP Cloud. You can also configure if users will receive files immediately or have to wait until the file analysis is completed to continue with the download. Users who downloaded files with a risk factor higher than the defined risk threshold are placed in quarantine. Create access rules to define what is blocked for the infected users and/or IP addresses.
Before you begin
- Configure a System Notification Email address. For more information, see How to Configure Email Notifications.
- Enable virus scanning in the firewall for web, mail, and/or FTP traffic. For more information, see How to Configure Virus Protection in the Firewall for Web Traffic, How to Configure Mail Security in the Firewall, and How to Configure Virus Scanning in the Firewall for FTP Traffic.
- Verify that all file types you want to scan with ATP for HTTP and SMTP connections are also listed in the scanned MIME types of the virus scanner. For more information, see How to Configure Virus Protection in the Firewall for Web Traffic.
Step 1. Enable ATD in the firewall and configure scan policies
Enable ATD and configure the ATD scan policies for HTTP, HTTPS, SMTP and SMTPS connections. Depending on the policy, the user will have to wait for scanning to complete before the file is forwarded. FTP traffic is always scanned with the Deliver before scan complete policy.
Go to the FIREWALL > Settings page.
- In the Advanced Threat Detection section, enable Advanced Threat Detection.
Next to Deliver before scan complete, select the global scan policy:
- Yes – The user receives the file or email immediately. If malware is found, the quarantine policy applies.
- No – The user is redirected to a scanning page. If no malware is found during the scan, the download starts.
- Select the Block Threats policy:
- High only – Files classified as high risk are blocked.
- High and Medium only – Files classified as high or medium risk are blocked.
- High, Medium and Low – Files classified as high, medium or low risk are blocked. Only files with classification None are allowed.
- Configure automatic blacklisting for HTTP and HTTPS traffic:
- From the Quarantine Policy drop down, select the policy for automatic blacklisting:
- No automatic blacklisting – No connections are blocked.
- User – All connections by the infected user are blocked regardless of the source IP address.
- IP – All connections by the infected source IP address are blocked regardless of the user.
- User AND IP – All connections originating from the infected source IP address and the infected user are blocked. If a different user logs in to the infected computer, all connections are allowed because only one criteria, the source IP address, matches. If the username for the connection is unknown, only the IP address is blocked.
- User OR IP – All connections coming from the infected source IP address and/or the infected user are blocked. If a different user logs into the infected computer, all connections are blocked because the source IP is blocked. If the infected user logs in to a different workstation, connections are blocked because the infected user is blocked.
- From the Quarantine Policy drop down, select the policy for automatic blacklisting:
- Click Save.
Step 2. Configure advanced scan settings
If needed, set the individual scan policies for each file type:
Go to the FIREWALL > Settings page.
- In the Advanced Threat Detection section, select Show next to Advanced Options.
- In the General section, configure the following settings:
Encrypted Archives handling – Specify what happens if encrypted archives were detected. Default: Report only
Max. Archive size – Maximum allowed archive size. Default:
1024
. Set to0
to disable.Large Archives handling – Specify what happens if Max. Archive size is exceeded. Default: Report only
Send Notification E-mails – To system settings Address sends a notification mail for every malicious file found by ATP.
ATD Report Page size – Select the page format for ATP reports.
- If needed, set the individual HTTP and HTTPS scan policies for each file type:
- Apply Global Policy (default) – This file type is scanned according to the policy configured in the basic ATD settings.
- Do not scan – The file is not scanned and immediately forwarded to the user.
- Deliver First, then Scan – The user receives the file immediately. If malware is found, the quarantine policy applies.
- Scan First, then Deliver – The user is redirected to a scanning page. After the scan is complete, the download starts.
- Click Save.
After specifying the ATD settings, click Save to save your configuration changes.
Step 3. Create two quarantining access rules
To block users and/or IP addresses, you must create access rules using the ATD User Quarantine network object. Place the Block rules before any other access rules handling traffic for these IP addresses and/or users. Enable HTTP Block Page to redirect HTTP traffic from quarantined users or IP addresses to the custom quarantine block page. You must allow DNS queries from quarantined users to display the HTTP block page. Non-HTTP traffic is simply blocked or denied.
Create a new access rule to allow DNS queries:
- Go to FIREWALL > Firewall Rules.
Click Add Access Rule to create a new access rule.
In the Add Access Rule window, enter a name and description for the rule.
Specify the following settings:
Action Connection Service Source Destination Allow Select a connection object to allow you to connect to the DNS server. DNS Select ATD Quarantine network object. Enter the IP addresses of your DNS servers. - Click Save.
- Place the access rule so that no rule before it matches the same traffic.
Create a second access rule:
- Go to FIREWALL > Firewall Rules.
Click Add Access Rule to create a new access rule.
In the Add Access Rule window, enter a name and description for the rule.
Specify the following settings:
Action Connection Service Source Destination Block Select a connection object to allow you to connect to the DNS server. Select Any. Select ATD Quarantine network object. Select Any (0.0.0.0/0) network object. - In the Add Access Rule window, click the Advanced tab.
- In the Other section, set HTTP Block Page to Quarantine Page.
- Click Save.
- Place the access rule directly below the rule allowing DNS queries from the quarantine so that no rule before it matches the same traffic.
Quarantined users or users connecting via HTTP from quarantined IP addresses are automatically redirected to the customizable quarantine page. For more information, see Custom Block Pages.
Step 4. Edit access rules to use ATP
Enable ATD by editing the access rules handling traffic you want to be scanned. E..g, LAN-2-INTERNET
- Go to FIREWALL > Firewall Rules.
Create or edit an access rule.
- Edit the access rule handling the traffic you want analyzed by ATP.
- On the General page, select the following options:
- Application Control – required.
- SSL Inspection – optional.
- Virus Protection – required.
- ATD – required.
- Click Save.
All traffic handled by access rules with ATD enabled are now scanned by the ATP service. Blocked files are listed on the BASIC > Recent Threats page. To view scan results, go to BASIC > ATD.
File scanning on the ATD page
The ATD page displays results and processes file scanning via Advanced Threat Protection. Use the global filter settings to adjust the amount of displayed files. To access the information about the files scanned by ATP, click the tabs.
Files in Progress tab
This tab displays all files that are currently scanned or waiting in the queue. The information displayed on this page is listed in columns. The State column shows the ATP scan status.
Scanned Files tab
Clicking this tab queries the ATP list and displays all files that were scanned by ATP.
The Action column provides a set of icons, offering the following options:
- Details – Opens the ATD File Details window.
- Download – Offers the option to download a scan report.
- Move to Quarantine – Moves the file to the Quarantine page.
- Delete Entry – Deletes the file entry.
Download a scan report
Scanned files are displayed on the Scanned Files page. You can download a basic or detailed version of the scan report.
- Go to BASIC > ATD.
- Select the scanned file.
- From the Action menu, select the Download Report icon.
- Select the report type:
- Summary Report – Download a basic summary report
- Full Report – Download a detailed report
- Save the report to your desired location.
Malicious Files tab
This tab displays all files that were blocked by ATP.
The Action column provides the same options as on the Scanned Files tab. If you want to remove a file from the list, click the trash can icon and choose the action Delete Entry to delete the file entry. To remove all files, select Remove all entries on this page.
Quarantine tab
Displays all files that are quarantined due to the Quarantine Policy.
If you want to remove a file from the quarantine, click the trash can icon and choose the action Remove from Quarantine. To remove all files from the list, select Remove all entries on this page.
Quarantined users and/or IP addresses are also shown on the BASIC > Status page.
Manual File upload
If you want to manually check a local file using ATP, you can upload the file to the ATP Cloud. After the file has been scanned, you are mailed a report with the scan results.
For more information, see How to Manually Upload Files to ATP/ATD.
Next step
(Optional) To protect SMTP and SMTPS traffic, enable ATD in the Mail Security settings. For more information, see Mail Security in the Firewall.