throbber
Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 1 of 5
`Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 1of5
`
`EXHIBIT G
`EXHIBIT G
`
`

`

`Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 2 of 5
`
`Sky Advanced Threat Prevention Administration
`Guide
`
`Modified: 2017-09-08
`
`Copyright © 2017, Juniper Networks, Inc.
`
`

`

`Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 3 of 5
`
`Juniper Networks, Inc.
`1133 Innovation Way
`Sunnyvale, California 94089
`USA
`408-745-2000
`www.juniper.net
`
`Copyright © 2017 Juniper Networks, Inc. All rights reserved.
`
`Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in
`the United States and other countries. All other trademarks may be property of their respective owners.
`
`Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
`transfer, or otherwise revise this publication without notice.
`
`Sky Advanced Threat Prevention Administration Guide
`Copyright © 2017 Juniper Networks, Inc. All rights reserved.
`
`The information in this document is current as of the date on the title page.
`
`YEAR 2000 NOTICE
`
`Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the
`year 2038. However, the NTP application is known to have some difficulty in the year 2036.
`
`END USER LICENSE AGREEMENT
`
`The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks
`software. Use of such software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at
`http://www.juniper.net/support/eula/. By downloading, installing or using such software, you agree to the terms and conditions of that
`EULA.
`
`ii
`
`Copyright © 2017, Juniper Networks, Inc.
`
`

`

`Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 4 of 5
`
`CHAPTER 8
`
`Scanning Email Attachments
`
`• Email Management Overview on page 51
`
`• Email Management: Configure SMTP on page 52
`
`• Email Management: Configure Blacklists and Whitelists on page 55
`
`• SMTP Quarantine Overview on page 55
`
`• Configuring the SMTP Email Management Policy on page 57
`
`• Configuring Reverse Proxy on page 62
`
`Email Management Overview
`
`With Email Management, enrolled SRX devices transparently submit potentially malicious
`email attachments to the cloud for inspection. Once an attachment is evaluated, Sky
`ATP assigns the file a threat score between 0-10 with 10 being the most malicious.
`
`NOTE: If an email contains no attachments, it is allowed to pass without any
`analysis.
`
`Configure Sky ATP to take one of the following actions when an email attachment is
`determined to be malicious:
`
`• Quarantine Malicious Messages—If you select to quarantine emails with attachments
`found to be malicious, those emails are stored in the cloud in an encrypted form and
`a replacement email is sent to the intended recipient. That replacement email informs
`the recipient of the quarantined message and provides a link to the Sky ATP quarantine
`portal where the email can be previewed. The recipient can then choose to release the
`email by clicking a Release button (or request that the administrator release it) or
`Delete the email.
`
`• Deliver malicious messages with warning headers added—When you select this option,
`headers are added to emails that most mail servers recognize and filter into Spam or
`Junk folders.
`
`• Permit—You can select to permit the email and the recipient receives it intact.
`
`Copyright © 2017, Juniper Networks, Inc.
`
`51
`
`

`

`Case 3:17-cv-05659-WHA Document 113-8 Filed 06/22/18 Page 5 of 5
`
`Sky Advanced Threat Prevention Administration Guide
`
`Figure 18: Email Management Overview
`
`Quarantine Release
`
`If the recipient selects to release a quarantined email, it is allowed to pass through the
`SRX series with a header message that prevents it from being quarantined again, but the
`attachments are placed in a password-protected ZIP file. The password required to open
`the ZIP file is also included as a separate attachment. The administrator is notified when
`the recipient takes an action on the email (either to release or delete it).
`
`If you configure Sky ATP to have the recipient send a request to the administrator to
`release the email, the recipient previews the email in the Sky ATP quarantine portal and
`can select to Delete the email or Request to Release. The recipient receives a message
`when the administrator takes action (either to release or delete the email.)
`
`Blacklist and Whitelist
`
`Emails are checked against administrator-configured blacklists and whitelists using
`information such as Envelope From (MAIL FROM), Envelope To (RCPT TO), Body Sender,
`Body Receiver. If an email matches the whitelist, that email is allowed through without
`any scanning. If an email matches the blacklist, it is considered to be malicious and is
`handled the same way as an email with a malicious attachment.
`
`Email Management: Configure SMTP on page 52
`
`Email Management: Configure Blacklists and Whitelists on page 55
`
`• •
`
`Related
`Documentation
`
`• SMTP Quarantine Overview on page 55
`
`Email Management: Configure SMTP
`
`Access this page from Configure > Email Management > SMTP.
`
`• Read the “Email Management Overview” on page 51 topic.
`
`52
`
`Copyright © 2017, Juniper Networks, Inc.
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket