Overview

This section allows sysadmin-level users to enable scanning of incoming files using a remote anti-virus server. MOVEit Transfer will submit incoming files to the anti-virus (AV) and/or Data Loss Prevention (DLP) server using the ICAP protocol. Files that are clean are then passed into the MOVEit Transfer filesystem.

Note: If you are using the AS2 Module to transfer files, be aware that content scanning does not apply to AS2 transfers. Use MOVEit Automation to scan AS2 transfers for viruses.

For more information on the Content Scanning feature and associated logs and reporting, see the MFT Features and Advantages - Content Scanning topic.

Set Content Scanning for MOVEit Transfer Hosts

A name for the content scanner and the location (Server URL) for the content scanner are required settings. All of the Content Scanning settings apply to all MOVEit Transfer hosts on the system. The settings are described below:

Note: You can enable or disable Content Scanning for each organization in Settings - Security Policies - Content Scanning. You need to be signed on as an organization administrator (commonly referred to as "org admin").
  • Scan uploads: Yes means content scanning is enabled for the MOVEit Transfer system, for all organizations. No means content scanning is disabled for all organizations on the system.
  • Name: This is a user-defined name for the content scanning activity, such as AV scan.
  • Server URL: This is the address of the anti-virus (ICAP) server. This address requires the prefix icap:// (for example: icap://scansrv:1344)
  • Server Type: Scan engine type.
  • Do Preview: File or file(s) preview information gives the ICAP server clues that can make processing files more efficient.
  • Server allows "204" responses: The default setting Yes will allow faster scanning, as the 204 response allows the server to return an updated header without body data.
  • Chunk Size: ICAP payload size submitted to the scanner.
  • Maximum file size to scan: The default setting of 15 MB (recommended) means that uploaded files that exceed 15 MB in size will not be fully scanned. MOVEit Transfer does not exclude files larger than the size selected, it actually scans up to the size selected on all files. IF no problem is found in the partial scan, the file is allowed into the MOVEit Transfer filesystem. To eliminate maximum file size as part of your scan policy, enter 0 (zero) to denote "no maximum" and scanning all files (regardless of their size).
    Note: Large maximum or no maximum policies can slow performance and can depend on the performance and capabilities of your third-party AV scan engine.
  • Server connection timeout: The default setting of 5 seconds means that if MOVEit Transfer cannot establish a connection with the scanning server within 5 seconds, a connection failure occurs. MOVEit Transfer will attempt to connect again until the maximum number of server connection tries is reached.
  • Server send timeout: The default setting of 30 seconds means that if MOVEit Transfer cannot send to the anti-virus server within 30 seconds, a connection failure occurs. MOVEit Transfer will attempt to connect again until the maximum number of server connection tries is reached.
  • Server receive timeout: The default setting of 30 seconds means that if the anti-virus server cannot receive from MOVEit Transfer within 30 seconds, a connection failure occurs. MOVEit Transfer will attempt to connect again until the maximum number of server connection tries is reached.
  • Server connection tries: The default setting of 3 means that MOVEit Transfer will try up to 3 times to create the initial connection to the anti-virus server.
  • Change Content Scanning: After making any entries or changes, click this button to apply the changes.
  • Test Content Scanning: Tests the AV or DLP capability by sending a known fake infected file (EICAR.COM) to the ICAP server and ensuring that the file is marked as infected or ensuring that the DLP server was contacted successfully. (To avoid problems with other AV packages that may be running on the system, the EICAR is stored encrypted.) Before testing, be sure to save any changes to the settings by clicking the Change Content Scanning button.
    Note: The system determines the ICAP server type automatically.

The following screen shows an example of the configuration for a Sophos ICAP AV scanner.

Logging

If a file was scanned, file detail pages will display the ICAP server information.

If a file fails the scan, an error message appears on the browser page of the user who uploaded the file.

Also, log file entries report the user-configured name of the ICAP server used during the file upload. File records also report the self-identification, version, and virus definition or DLP policy tag from the server.

Error code numbers (6100 - 6103) are used to report AV errors. This will help when filtering logs. If an upload fails due to content scanning, the corresponding log table records will contain the AV server name and, if possible, the name of the virus.

Error code numbers 0 and 6150 are used to report DLP policy violations, as follows:

  • Error number 0 for violations that have been allowed or quarantined
  • Error number 6150 for violations that have been blocked

Notifications

Notification macros for content scanning, if enabled, can report the scan results for both anti-virus (AV) and data loss prevention (DLP) scans.

AV and/or DLP information may be included in the following notifications:

  • New File Upload Notification
  • File Upload Confirmation
  • New Package
  • New Package Secure Attach
  • New Temp User Package (with password)
  • New Temp User Package (with password) Secure Attach
  • New Temp User Package (with password link)
  • New Temp User Package (with password link) Secure Attach
  • New Guest Package
  • New Guest Package Secure Attach
  • File Non-Delivery Receipt
  • File Upload List Notification
  • File Upload List Confirmation
  • File Not Downloaded List
  • File Delivery Receipt
  • Package Delivery Receipt
  • Package Download Receipt
  • Package Deleted By User
  • Package User Was Deleted

The standard templates for these notifications do not include the content scanning results. You can add the macros that report the scan results by creating custom notification templates. Custom notifications are set in an organization via Settings | Appearance | Notification | Custom.

Reporting

You can add a Content Scanning report which shows blocked content scanning violations. An example of a violation is a file that failed an anti-virus (AV) check or violated a data loss protection (DLP) policy and was blocked. In this case, the report will show the name of the scanner, the file name, and the name of the virus (if known) or policy. If you are logged in as administrator for an organization, the report shows violations for your organization. If you are logged in as a system administrator, the report can show multiple organizations.