throbber
Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 1 of 6
`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 1 of 6
`
`
`
`
`
`
`EXHIBIT 18
`EXHIBIT 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 2 of 6
`Sky Advanced Threat Prevention
`>
`Sky Advanced Threat Prevention Administration Guide
`
`TechLibrary >
`
`Juniper Networks Sky Advanced Threat Prevention
`
`Juniper Networks Sky Advanced Threat Prevention (Sky ATP) is a security framework that protects all hosts in your
`network against evolving security threats by employing cloud-based threat detection software with a next-generation
`firewall system. See Figure 1.
`
`Figure 1: Sky ATP Overview
`
`Sky ATP protects your network by performing the following tasks:
`
`The SRX Series device extracts potentially malicious objects and files and sends them to the cloud for analysis.
`Known malicious files are quickly identified and dropped before they can infect a host.
`Multiple techniques identify new malware, adding it to the known list of malware.
`Correlation between newly identified malware and known Command and Control (C&C) sites aids analysis.
`The SRX Series device blocks known malicious file downloads and outbound C&C traffic.
`
`Sky ATP supports the following modes:
`
`Layer 3 mode
`Tap mode
`Transparent mode using MAC address. For more information, see Transparent mode on SRX Series devices.
`Secure wire mode (high-level transparent mode using the interface to directly passing traffic, not by MAC address.) For more
`information, see Understanding Secure Wire.
`
`Sky ATP Features
`Sky ATP is a cloud-based solution. Cloud environments are flexible and scalable, and a shared environment ensures
`that everyone benefits from new threat intelligence in near real-time. Your sensitive data is secured even though it is
`in a cloud shared environment. Security analysts can update their defense when new attack techniques are
`discovered and distribute the threat intelligence with very little delay.
`
`In addition, Sky ATP offers the following features:
`
`Integrated with the SRX Series device to simplify deployment and enhance the anti-threat capabilities of the firewall.
`Delivers protection against “zero-day” threats using a combination of tools to provide robust coverage against sophisticated,
`evasive threats.
`Checks inbound and outbound traffic with policy enhancements that allow users to stop malware, quarantine infected systems,
`Previous Page
`Next Page
`prevent data exfiltration, and disrupt lateral movement.
`
`

`

`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 3 of 6
`High availability to provide uninterrupted service.
`Scalable to handle increasing loads that require more computing resources, increased network bandwidth to receive more
`customer submissions, and a large storage for malware.
`Provides deep inspection, actionable reporting, and inline malware blocking.
`APIs for C&C feeds, whitelist and blacklist operations, and file submission. See the Threat Intelligence Open API Setup Guide
`for more information.
`

`
`Figure 2 lists the Sky ATP components.
`
`Figure 2: Sky ATP Components
`
`Table 1 briefly describes each Sky ATP component’s operation.
`
`Table 1: Sky ATP Components
`
`Component
`
`Operation
`
`Command and
`control (C&C) cloud
`feeds
`
`C&C feeds are essentially a list of servers that are known command and control for
`botnets. The list also includes servers that are known sources for malware downloads.
`
`GeoIP cloud feeds
`
`GeoIP feeds is an up-to-date mapping of IP addresses to geographical regions. This
`gives you the ability to filter traffic to and from specific geographies in the world.
`
`Infected host cloud
`feeds
`
`Infected hosts indicate local devices that are potentially compromised because they
`appear to be part of a C&C network or other exhibit other symptoms.
`
`Previous Page
`
`Next Page
`
`

`

`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 4 of 6
`
`Component
`
`Operation
`
`Whitelists, blacklists
`and custom cloud
`feeds
`
`A whitelist is simply a list of known IP addresses that you trust and a blacklist is a list
`that you do not trust.
`
`Note: Custom feeds are not supported in this release.
`
`SRX Series device
`
`Submits extracted file content for analysis and detected C&C hits inside the customer
`network.
`
`Performs inline blocking based on verdicts from the analysis cluster.
`
`Malware inspection
`pipeline
`
`Internal compromise
`detection
`
`Performs malware analysis and threat detection.
`
`Inspects files, metadata, and other information.
`
`Service portal (Web
`UI)
`
`Graphics interface displaying information about detected threats inside the customer
`network.
`
`Configuration management tool where customers can fine-tune which file categories
`can be submitted into the cloud for processing.
`
`How the SRX Series Device Remediates Traffic
`The SRX Series devices use intelligence provided by Sky ATP to remediate malicious content through the use of
`security policies. If configured, security policies block that content before it is delivered to the destination address.
`
`For inbound traffic, security policies on the SRX Series device look for specific types of files, like .exe files, to inspect.
`When one is encountered, the security policy sends the file to the Sky ATP cloud for inspection. The SRX Series device
`holds the last few KB of the file from the destination client while Sky ATP checks if this file has already been analyzed.
`If so, a verdict is returned and the file is either sent to the client or blocked depending on the file’s threat level and the
`user-defined policy in place. If the cloud has not inspected this file before, the file is sent to the client while Sky ATP
`performs an exhaustive analysis. If the file’s threat level indicates malware (and depending on the user-defined
`configurations) the client system is marked as an infected host and blocked from outbound traffic. For more
`information, see How is Malware Analyzed and Detected?.
`
`Figure 3 shows an example flow of a client requesting a file download with Sky ATP.
`
`Figure 3: Inspecting Inbound Files for Malware
`
`Previous Page
`
`Next Page
`
`

`

`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 5 of 6
`
`Step
`
`Description
`
`1
`
`2
`
`3
`
`4
`
`5
`
`A client system behind an SRX Series devices requests a file download from the Internet. The SRX Series
`device forwards that request to the appropriate server.
`
`The SRX Series device receives the downloaded file and checks its security profile to see if any additional
`action must be performed.
`
`The downloaded file type is on the list of files that must be inspected and is sent to the cloud for
`analysis.
`
`Sky ATP has inspected this file before and has the analysis stored in cache. In this example, the file is not
`malware and the verdict is sent back to the SRX Series device.
`
`Based on user-defined policies and because this file is not malware, the SRX Series device sends the file
`to the client.
`
`For outbound traffic, the SRX Series device monitors traffic that matches C&C feeds it receives, blocks these C&C
`requests, and reports them to Sky ATP. A list of infected hosts is available so that the SRX Series device can block
`inbound and outbound traffic.
`
`Sky ATP Use Cases
`Sky ATP can be used anywhere in an SRX Series deployment. See Figure 4.
`
`Figure 4: Sky ATP Use Cases
`
`Previous Page
`
`Next Page
`
`

`

`Case 3:17-cv-05659-WHA Document 88-16 Filed 05/18/18 Page 6 of 6
`
`Campus edge firewall—Sky ATP analyzes files downloaded from the Internet and protects end-user devices.
`Data center edge—Like the campus edge firewall, Sky ATP prevents infected files and application malware from running on your
`computers.
`Branch router—Sky ATP provides protection from split-tunneling deployments. A disadvantage of split-tunneling is that users can
`bypass security set in place by your company’s infrastructure.
`
`Modified: 2017-08-29
`
`Previous Page
`
`Next Page
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket