Data sharing tab
The Configuration: Data sharing tab is only available for the Manager. It includes the following options:
- Upload malicious files
-
If Enabled, your system will notify the VMware backend about its detection of a malicious artifact by uploading the artifact content. Sharing this information will help us and the security community, with very little risk of exposing confidential or sensitive information. You can configure at what level of maliciousness the file is shared with the other options on this tab.
- Minimum score for documents
-
The analysis system must score documents at the defined level of maliciousness or higher before it can be shared with the VMware backend. The score is from 0 to 100. Enter a value or use the icon to change the value. Click the icon to select Never upload.
- Minimum score for executables
-
The analysis system must score executables at the defined level of maliciousness or higher before it can be shared with the VMware backend. The score is from 0 to 100. Enter a value or use the icon to change the value. Click the icon to select Never upload.
- Minimum score for Java files
-
The analysis system must score Java files at the defined level of maliciousness or higher before it can be shared with the VMware backend. The score is from 0 to 100. Enter a value or use the icon to change the value. Click the icon to select Never upload.
- Minimum score for SWF files
-
The analysis system must score Flash (media) files at the defined level of maliciousness or higher before it can be shared with the VMware backend. The score is from 0 to 100. Enter a value or use the icon to change the value. Click the icon to select Never upload.
- Upload connection metadata
-
If Enabled, connection metadata is shared with the VMware backend. This data includes the host (IP address and domain) from which the file was downloaded. It does not contain information about the client that downloaded the file.
- Upload protocol metadata
-
If Enabled, protocol metadata is shared with the VMware backend. This data includes the protocol (HTTP, FTP, etc) as well as protocol details (URL, referer, etc). It does not contain information about the client that downloaded the file.
When you are done, click the Save and deploy button to enable your changes. Otherwise click Cancel to discard any changes.
If you have not made any changes, click the Retrigger configuration button to reload the appliance configuration.
Click Back to appliance list to return to the Overview tab