Blocking Embedded Executable File in PDF or ZIP Container
search cancel

Blocking Embedded Executable File in PDF or ZIP Container

book

Article ID: 429276

calendar_today

Updated On:

Products

CAS-S500-A1 CAS-S500 CAS-S400-A4 CAS-S400-A3 CAS-S400-A2 CAS-S400-A1 CAS-S400 CAS-S200-A1 ISG Content Analysis

Issue/Introduction

Standard file-blocking policies may fail when an executable file is embedded within a container like a PDF or a ZIP archive. This happens because the Edge SWG identifies the outer container, like the PDF or the ZIP, bypasses the initial check while the inner content is the executable file. To block these effectively, both the Content Analysis and Edge SWG must be configured to communicate and act on the "apparent" data type.

Environment

Content Analysis (CAS) and Edge SWG (Proxy)

Resolution

Stage 1: Enable Content Analysis Internal Inspection 
1. Navigate to Content Analysis Web UI > Services > AV File Types

2. Add .exe in the List files extensions to block" field (Use a comma as the delimiter to separate file types. i.e.: .jse,.vb)

3. Check the box "Apply Global Options before sending to Antivirus Engines"

4. Check Application (.exe) to block 

5. Click Save Changes

Stage 2: Force Enforcement on Edge SWG
If the issue persists after Stage 1, the Edge SWG requires a specific rule to "Force Deny" based on the headers CAS sends back. Without this, the Proxy may still allow the file because the external extension, like the PDF or ZIP file, satisfies the initial policy.

1. Add the following CPL rules under the Edge SWG Management Console > Visual Policy Manager > Add Layer > CPL Layer.

;; Set ICAP service to fail closed to ensure security
<Cache>
    response.icap_service(<icap_service_name>, fail_closed)

;; Force Deny if CAS identifies the inner or apparent data type as executable
<Proxy>
    response.icap.apparent_data_type=(executable) FORCE_DENY

Note: Replace <icap_service_name> with the actual name of your ICAP service (e.g., CAS1).

2. Apply Policy and OK