Cisco Cisco Email Security Appliance C650 ユーザーガイド
17-5
AsyncOS 9.0 for Cisco Web Security Appliances User Guide
Chapter 17 File Reputation Filtering and File Analysis
Configuring File Reputation and Analysis Features
•
Information about every file that is sent to the cloud for analysis and has a verdict of "malicious" is
added to the reputation database. This information is used along with other data to determine a
reputation score.
added to the reputation database. This information is used along with other data to determine a
reputation score.
Information about files analyzed by an on premises Cisco AMP Threat Grid appliance is not shared
with the reputation service.
with the reputation service.
•
If you have configured your appliance to allow data to be sent to the Sender Base Reputation
Service, information about certain files is sent. For details, see information about the AMP cloud in
Service, information about certain files is sent. For details, see information about the AMP cloud in
Chapter 36, “SenderBase Network Participation.”
Configuring File Reputation and Analysis Features
•
•
•
•
•
•
•
•
•
•
•
•
•
Requirements for Communication with File Reputation and Analysis Services
•
All Email Security appliances that use these services must be able to connect to them directly over
the internet (excluding File Analysis services configured to use an on-premises Cisco AMP Threat
Grid Appliance.)
the internet (excluding File Analysis services configured to use an on-premises Cisco AMP Threat
Grid Appliance.)
•
By default, communication with file reputation and cloud-based analysis services is routed through
the interface that is associated with the default gateway. To route this traffic through a different
interface, create a static route for each address in the Advanced section of the Security Services >
File Reputation and Analysis page.
the interface that is associated with the default gateway. To route this traffic through a different
interface, create a static route for each address in the Advanced section of the Security Services >
File Reputation and Analysis page.
•
For information about required open firewall ports, see
Appendix D, “Firewall Information.”
Related Topics
•
Configuring TCP/IP Traffic Routes, page 33-54