Cisco Cisco FirePOWER Appliance 7115
Version 5.3
Sourcefire 3D System User Guide
1295
Working with Malware Protection and File Control
Working with Network File Trajectory
Chapter 31
network file trajectories and the most recently detected malware from the
Network File Trajectory List page.
For more information, see the following sections:
For more information, see the following sections:
•
•
•
•
•
•
•
•
Accessing Network File Trajectory
L
ICENSE
: Malware or Any
S
UPPORTED
D
EVICES
: feature dependent
S
UPPORTED
D
EFENSE
C
ENTERS
: feature dependent
The Network File Trajectory List page allows you to locate files that have a
SHA-256 hash value, whether to analyze the most recently detected malware, or
to track a specific threat.
The page displays the malware most recently detected on your network, as well
as the files whose trajectory maps you have most recently viewed. From these
lists, you can view when the file was most recently seen on the network, the
file’s SHA-256 hash value, name, type, current file disposition, and the number of
events associated with the file. For more information on the fields, see
The page also contains a search box that lets you locate files, either based on
SHA-256 hash value or file name, or by the IP address of the host that transferred
or received a file. After you locate a file, you can click the File SHA256 value to view