How to Configure a Malicious File Scanner
Viruses can steal sensitive information, encrypt your data, spoof your identity, and attack other devices on connected networks. malicious file scanner helps you keep these threats at bay by scanning for common malicious files and detecting suspicious patterns that are unique to modern malware.
Ensure you’re using the right settings for your environment. Malware scanning requires a certain amount of memory, identities and networking resources to function properly. If these aren’t available or configured correctly, scanning may stop working.
Detect and Defend: The Crucial Role of Malicious File Scanners
Review the application’s documentation to understand what file types it accepts and expects to find, as well as any risks associated with specific files. If necessary, adjust the setting based on your group’s policies and business use cases.
Test your application in a few scenarios, including uploading a malicious file. If an event is triggered (see Manage events for details), follow the steps in Manage malicious file upload events to reconfigure your policy settings. You can also view details of each event to determine what caused the event and to resolve it. For example, if an event was triggered because the file was five MB larger than the maximum file size, you might want to increase this limit to prevent the issue in the future. However, it’s important to test the changes to your policy against real-world, expected behavior so you can be confident your new setting will work as intended. This includes testing against third-party integrations such as CRMs, collaborative workflows and data pipelines where files are shared with multiple parties across an enterprise.