LogoLogo
  • ShieldsGuard - User Guide
  • Installation Steps
    • Shields Guard Installation
    • Shields Guard SEG Installation
  • Getting Started
    • 1. General Welcome and Site Management Panel
    • 2. Overview
      • 2.1 Today's Data
      • 2.2 Country Statistics
      • 2.3 URL Statistics
      • 2.4 IP Statistics
      • 2.5 HTTP Status Statistics
    • 3. Protection
      • 3.1 DDoS Protection
        • 3.1.1 Google Recaptcha Setup
        • 3.1.2 Friendly Captcha Setup
      • 3.2 WAF – Web Application Firewall
    • 4. Security Rules
      • 4.1 BlackList & WhiteList
      • 4.2 User Agent Filtering
      • 4.3 Query String Filtering
      • 4.4 HTTP Header Filtering
      • 4.5 Block POST Values
      • 4.6 Custom Headers
      • 4.7 Block URL Requests
      • 4.8 URL Path Blocking
      • 4.9 Encrypt Path
      • 4.10 Remove Request Value
      • 4.11 Exclude Directories from Protection
    • 5. Logs
      • 5.1 Access Log
      • 5.2 Security Log
    • 6. Asset Management
      • 6.1 Asset Management
      • 6.2 Network Topology
      • 6.3 Vulnerability Scan
    • 7. Access
  • 8. DNS
  • 9. SSL
  • 10. Subdomain Manage
  • 11. Edit Page
  • ShieldsGuard SEG
    • 1. SEG Dashboard
    • 2. Reporting
    • 3. Analyzed
      • 3.1 Files
      • 3.2 URL
      • 3.3 Mail
      • 3.4 Domain
    • 4. Mail Settings
      • 4.1 File
      • 4.2 Mail Body
      • 4.3 Sender Domain
Powered by GitBook
On this page
Export as PDF
  1. ShieldsGuard SEG
  2. 3. Analyzed

3.1 Files

Previous3. AnalyzedNext3.2 URL

Last updated 9 days ago

📖 Overview

The Files submodule within the Analyzed section provides a complete historical log of all scanned file attachments processed by ShieldsGuard SEG.

These files are typically extracted from emails and analyzed in real-time using static and dynamic malware analysis engines. The verdict assigned to each file allows analysts to identify harmful content before it reaches end users.

🛡️ Every file scanned here is a potential entry point for ransomware, trojans, and spyware. Monitoring this data is critical for your email security posture.


🧠 What You’ll See

Column
Description

File Name

The original or hashed name of the file

Analysis Time

Timestamp of when the file was processed

Verdict

Final analysis result (e.g., MALICIOUS, SUSPICIOUS, CLEAN, MAX FILE SIZE)

Actions

View contextual details (related email, sender, etc.)


🧪 Verdict Types

Verdict Label
Meaning

MALICIOUS

Confirmed malware or dangerous file behavior

SUSPICIOUS

Indicators of compromise or obfuscation, but not fully confirmed

MAXIMUM FILE SIZE

File exceeds configured scan threshold, not analyzed

CLEAN

File passed all security checks

⚠️ Files flagged as MALICIOUS are automatically quarantined and blocked from delivery.


🔍 Use Cases

Scenario
Benefit

Track malware campaigns

Identify reused or recurring malicious attachments

Audit file-based threats

Analyze when and how a file entered the system

Investigate delivery paths

Correlate file to sender, recipient, and source domain

Triage based on file type

Block dangerous extensions (.exe, .zip, .js, .rar)


📤 Integration with Email

Each file is directly linked to the email message it was extracted from. You can:

  • View the full Mail ID and associated metadata

  • Analyze the Sender Domain, Attachments, and URLs in the same panel

  • Take action (e.g., block domain, quarantine user)


🛡️ File Type Intelligence

Common file formats analyzed:

  • .doc, .xls, .pdf – Office-based exploits

  • .zip, .rar, .tar – Archive attacks with embedded payloads

  • .js, .vbs, .ps1 – Script-based threats

  • .exe, .dll – Direct executables

  • .img, .iso, .lnk – Advanced initial access formats


⚙️ Analyst Tips

  • Filter files by verdict to quickly review only malicious or suspicious entries.

  • Use timestamps to correlate large-scale attack waves or targeted campaigns.

  • Combine this module with 3.3 Mail for full context.


🎯 The Files module is your forensic vault for malicious attachments — a vital tool for hunting, prevention, and incident response.