Reviewing Malware Events

Malware events are triggered by the Anti-Malware engine. It comprises of matching the file against a data base of known malicious files (Anti-Virus) and running it through an advanced sandbox (Threat Emulation).

To review the event details, open the attachment profile page for the malicious event. In the Anti-Malware section under Security Stack, you can do these.

  • To view the sandbox report with detailed explanation about why the file was deemed malicious, click View Report.

    • To download the malicious file from the report to your local computer, click Actions > Download File.

      Warning - You should use the downloaded file with care as the malware can cause significant damage to computers, networks and corporate data.

      • To help you not run the malicious file accidentally on your local computer, the malicious file gets downloaded in the compressed tar.gz format as a password protected file.

      • Use infected_te_report as the password to extract the malicious file.

  • To view the confidence level of the detection by the sandbox or the signature used by the static engines used to detect the malware, click More Info.

Acting on Malware Events

  • To quarantine an email, click Quarantine Email from the email profile.

  • To release an email from quarantine, click Restore Email if the email is already in quarantine.

  • To exclude a file that you believe was falsely detected as containing malware, add the file to Allow-List. See Anti-Malware Exceptions.

  • To mark any file type as malware, add the file to Block-List. See Anti-Malware Block-List.