In This Section: |
Use the Upload API to have a client application request that Check Point Threat Prevention modules scan and analyze a file. When you upload a file to the service, the file is encrypted. It is un-encrypted during analysis, and then deleted.
Upload Requests are submitted with multiple parts: body (request
) and file buffer (file
).
Best Practice: Use this API after the client application used the Query API. Only if the service does not have the required data about that file, upload the file.
Note: The Upload Response headers and format are the same as in the Query API.