{"id":161276,"date":"2024-08-19T07:38:05","date_gmt":"2024-08-19T06:38:05","guid":{"rendered":"https:\/\/www.avanet.com\/kb\/sophos-firewall-how-does-zero-day-protection-work\/"},"modified":"2024-09-03T10:08:05","modified_gmt":"2024-09-03T09:08:05","slug":"sophos-firewall-how-does-zero-day-protection-work","status":"publish","type":"kb","link":"https:\/\/www.avanet.com\/en\/kb\/sophos-firewall-how-does-zero-day-protection-work\/","title":{"rendered":"Sophos Firewall &#8211; How does Zero-Day Protection work?"},"content":{"rendered":"\n<p>Zero-Day Protection is a security module for the Sophos Firewall designed to protect against previously unknown threats.\nThis module uses advanced sandboxing technologies to execute and analyze suspicious files in a secure, isolated environment.\nThis allows threats to be detected and blocked before they can cause any damage.\nZero-Day Protection provides an additional layer of protection and is particularly valuable at a time when new and previously unknown vulnerabilities are quickly exploited.   <\/p>\n\n<p>In this article, we explain how Zero-Day Protection works, which file formats are supported and which steps are taken to detect and neutralize a potential threat.<\/p>\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h2>Topics<\/h2><nav><ul><li class=\"\"><a href=\"#1-erkennung-und-weiterleitung\"><a href=\"#1-erkennung-und-weiterleitung\">1. Detection and forwarding<\/a><\/a><ul><li class=\"\"><a href=\"#voraussetzungen\">Requirements<\/a><\/li><\/ul><\/li><li class=\"\"><a href=\"#2-analyse-durch-sophos-labs-intelix\"><a href=\"#2-analyse-durch-sophos-labs-intelix\">2. Analysis by SophosLabs Intelix<\/a><\/a><\/li><li class=\"\"><a href=\"#3-sandbox-analyse\"><a href=\"#3-sandbox-analyse\">3. sandbox analysis<\/a><\/a><\/li><li class=\"\"><a href=\"#4-erstellung-eines-berichts\"><a href=\"#4-erstellung-eines-berichts\">4. Preparation of a report<\/a><\/a><\/li><li class=\"\"><a href=\"#einzelne-dateien-testen\"><a href=\"#einzelne-dateien-testen\">Test individual files<\/a><\/a><\/li><li class=\"\"><a href=\"#faq\">FAQ<\/a><ul><li class=\"\"><a href=\"#faq-question-1724049821500\"><a href=\"#faq-question-1724049821500\">What is Sophos Zero-Day Protection?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049843873\"><a href=\"#faq-question-1724049843873\">How does Zero-Day Protection work?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049845462\"><a href=\"#faq-question-1724049845462\">What types of files are analyzed by Zero-Day Protection?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049846381\"><a href=\"#faq-question-1724049846381\">How are suspicious files analyzed?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049848058\"><a href=\"#faq-question-1724049848058\">How long does the analysis by Zero-Day Protection take?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049849075\"><a href=\"#faq-question-1724049849075\">Will my data be processed securely?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724049996837\"><a href=\"#faq-question-1724049996837\">In which data centers are my files analyzed?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724050023358\"><a href=\"#faq-question-1724050023358\">What protective measures does Zero-Day Protection offer against ransomware?<\/a><\/a><\/li><li class=\"\"><a href=\"#faq-question-1724050046331\"><a href=\"#faq-question-1724050046331\">Is it possible to see which files have been analyzed by Zero-Day Protection?<\/a><\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"1-erkennung-und-weiterleitung\">1. detection and forwarding<\/h2>\n\n<p>When a file enters your network, whether through a download or as an email attachment, Sophos Firewall automatically recognizes this file.\nIt does not matter whether it is a known or unknown file.\nAs soon as the file is recognized, the firewall forwards it to SophosLabs Intelix, Sophos&#8217;s cloud service, for further analysis.  <\/p>\n\n<h3 class=\"wp-block-heading\" id=\"voraussetzungen\"><strong>Requirements<\/strong><\/h3>\n\n<p><strong>Licensing:<\/strong> It must be ensured that Web Protection or E-Mail Protection is licensed for Sophos Firewall, as these modules are necessary to analyze the file correctly.<\/p>\n\n<p><strong>File size:<\/strong> The file must be smaller than <strong>10 MB<\/strong> to be processed by Zero-Day Protection.<\/p>\n\n<p><strong>Supported file formats:<\/strong> Only certain file formats are supported by Zero-Day Protection.\nThese include, among others: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Executable files (.exe, .dll)<\/li>\n\n\n\n<li>Documents (PDF, Microsoft Office formats such as .docx, .xlsx)<\/li>\n\n\n\n<li>Archives (ZIP, RAR, 7-Zip)<\/li>\n\n\n\n<li>Scripts (JavaScript, VBScript)<\/li>\n\n\n\n<li>Other formats such as JAR, BAT, RTF and LNK files.<\/li>\n<\/ul>\n<div class=\"gb-container gb-container-519254af gb-accordion\">\n<div class=\"gb-container gb-container-9601f001 gb-accordion__item gb-accordion__item-open\" data-transition=\"slide\">\n\n<button class=\"gb-button gb-button-9143656c gb-accordion__toggle gb-block-is-current\" id=\"gb-accordion-toggle-9143656c\"><span class=\"gb-button-text\">Complete list<\/span><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" width=\"1em\" height=\"1em\" aria-hidden=\"true\" role=\"img\" class=\"gb-accordion__icon\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\" fill=\"currentColor\"><\/path><\/svg><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" width=\"1em\" height=\"1em\" aria-hidden=\"true\" role=\"img\" class=\"gb-accordion__icon-open\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\" fill=\"currentColor\"><\/path><\/svg><\/span><\/button>\n\n\n<div id=\"gb-accordion-content-569ab3cc\" class=\"gb-accordion__content\"><div class=\"gb-container gb-container-569ab3cc\">\n\n<ul class=\"wp-block-list\">\n<li>7-Zip archive<\/li>\n\n\n\n<li>ACE Archive<\/li>\n\n\n\n<li>ARJ Archive<\/li>\n\n\n\n<li>BZIP2 Compressed<\/li>\n\n\n\n<li>GZIP Compressed<\/li>\n\n\n\n<li>ISO 9660 CD-ROM<\/li>\n\n\n\n<li>LHA 1.x &amp; 2.x archive<\/li>\n\n\n\n<li>Microsoft Cabinet Archive<\/li>\n\n\n\n<li>TAR Archive<\/li>\n\n\n\n<li>POSIX TAR Archive<\/li>\n\n\n\n<li>RAR Archive<\/li>\n\n\n\n<li>XZ Compressed<\/li>\n\n\n\n<li>ZIP archive<\/li>\n\n\n\n<li>Java (JAR files)<\/li>\n\n\n\n<li>Office documents (OLE &amp; Open XML formats)<\/li>\n\n\n\n<li>PDF documents<\/li>\n\n\n\n<li>PE (32-bit &amp; 64-bit, EXE &amp; DLL)<\/li>\n\n\n\n<li>RTF documents<\/li>\n\n\n\n<li>Scripts JavaScript (JS\/JSE\/WSF), Visual Basic Script (VBS\/VBE)<\/li>\n\n\n\n<li>Windows Batch \/BAT files\/<\/li>\n\n\n\n<li>Windows shortcuts (LNK &amp; URL files)<\/li>\n<\/ul>\n\n\n\n<p>More information can be found here: <a href=\"https:\/\/docs.sophos.com\/nsg\/sophos-firewall\/18.5\/Help\/en-us\/webhelp\/onlinehelp\/AdministratorHelp\/ZeroDayProtection\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Sophos KB: Zero-Day Protection<\/a> or <a href=\"https:\/\/support.sophos.com\/support\/s\/article\/KBA-000004113?language=en_US\" target=\"_blank\" rel=\"noopener\">Sophos Zero-Day Protection FAQ<\/a><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div>\n<p>As soon as these requirements are met, the file is sent to SophosLabs Intelix for further analysis.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"2-analyse-durch-sophos-labs-intelix\">2. analysis by SophosLabs Intelix<\/h2>\n\n<p>Once a file is recognized by the Sophos Firewall as suitable for analysis, it is uploaded to the Sophos Cloud, where the analysis process begins.\nSophosLabs Intelix uses machine learning, sandboxing and threat research to analyze the file for potential risks.\nThe file is run in an isolated environment that simulates different operating systems to ensure it is tested under realistic conditions without putting your system at risk.  <\/p>\n\n<p><strong>Available data centers:<\/strong><\/p>\n\n<ul class=\"wp-block-list\">\n<li>Asia-Pacific (Sydney, Tokyo)<\/li>\n\n\n\n<li>Europe (Frankfurt, London)<\/li>\n\n\n\n<li>United States<\/li>\n<\/ul>\n\n<p>If no specific region is selected, the system will use the nearest data center based on latency.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"3-sandbox-analyse\">3. sandbox analysis<\/h2>\n\n<p>The first analysis tool that is used is machine learning.\nSophosLabs Intelix uses several models to evaluate the properties and global reputation of the file.\nThe file is compared with millions of known safe and malicious files to determine its potential maliciousness.  <\/p>\n\n<p>After this evaluation, the file undergoes a sandbox analysis that uses both dynamic and static techniques.\nFile access, memory and registry manipulation and network activities are monitored.\nIn addition, deep learning is used for exploit detection and CryptoGuard is used to identify ransomware behavior.\nThis step protects the network from zero-day threats such as ransomware and targeted attacks.   <\/p>\n\n<p>While running in the sandbox, Sophos continuously monitors various parameters to detect potentially malicious behavior.\nThese include: <\/p>\n\n<ul class=\"wp-block-list\">\n<li>Unexpected network activities<\/li>\n\n\n\n<li>Manipulation of the operating system<\/li>\n\n\n\n<li>Attempts to access sensitive data<\/li>\n\n\n\n<li>Self-replication or other typical viral behaviors<\/li>\n<\/ul>\n\n<p>This thorough analysis process can take several minutes, which is why the download may be delayed by up to <strong>15 minutes<\/strong> until the analysis is complete.<\/p>\n\n<p>In addition to the technical analysis of the file, SophosLabs Intelix performs a reputation analysis.\nThis analysis evaluates how widespread the file is and how it has been treated by other security solutions in the past.\nThis helps to better assess the risk.  <\/p>\n\n<p><strong>Block or unblock:<\/strong> Based on the results of the sandboxing analysis, the file is either unblocked or blocked.\nIf the file is classified as safe, the user can download it immediately.\nOtherwise, it is blocked and the administrator is informed of the threat.  <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"4-erstellung-eines-berichts\">4. preparation of a report<\/h2>\n\n<p>Once the analysis has been completed, a detailed report is produced summarizing the results of the various analysis steps.\nThis report contains information such as <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Download details:<\/strong> Origin of the file, time of download and the users who downloaded the file.<\/li>\n\n\n\n<li><strong>Summary of the analysis:<\/strong> An overview of the overall result of the Zero-Day Protection analysis, the classification of the file (e.g. clean, suspicious, malicious) and a brief description of the threats detected.<\/li>\n\n\n\n<li><strong>Results of the machine learning analysis:<\/strong> Details on the analysis of file properties, structure and combinations of features.<\/li>\n\n\n\n<li><strong>Zero-Day Protection detonation results:<\/strong> Information about the activities that the file performs, including screenshots and details of the processes and registry activity used.<\/li>\n\n\n\n<li><strong>Complete file analysis:<\/strong> Comprehensive file details, including signatures, certificates used, resources accessed and import\/export functions.<\/li>\n\n\n\n<li><strong>VirusTotal report:<\/strong> Number of entries in the VirusTotal database and how many malware detection products identify the file as a threat.<\/li>\n<\/ul>\n\n<p>Administrators can view the detailed reports of the Zero-Day Protection analysis at any time to better understand the risk.\nIt is also possible to release files or email messages that are still being analyzed or where an error has occurred.\nHowever, caution is advised here, as sharing before the analysis has been completed carries the risk of downloading malicious content.  <\/p>\n\n<h2 class=\"wp-block-heading\" id=\"einzelne-dateien-testen\">Test individual files<\/h2>\n\n<p>In the blog post <a href=\"https:\/\/www.avanet.com\/en\/blog\/sophoslabs-intelix-the-cyber-threat-detection-tool\/\">SophosLabs Intelix &#8211; The tool for detecting cyber threats<\/a>, it is explained how you can also check individual files with the online tool <a href=\"https:\/\/intelix.sophos.com\/\" target=\"_blank\" rel=\"noopener\">Sophos Intelix<\/a>.<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"faq\">FAQ<\/h2>\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1724049821500\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>What is Sophos Zero-Day Protection?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Sophos Zero-Day Protection is a security module for Sophos Firewall designed to detect and block new, previously unknown threats.<br \/>\nIt uses advanced technologies such as machine learning, sandboxing and threat research to analyze and evaluate suspicious files and email attachments. <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049843873\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>How does Zero-Day Protection work?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>As soon as a suspicious file or email attachment enters the network, it is sent to SophosLabs Intelix\u2122 for analysis.<br \/>\nThere, the file undergoes a multi-stage analysis that includes machine learning and sandboxing.<br \/>\nThe system examines the file for suspicious behavior and blocks it if it is classified as dangerous.  <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049845462\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>What types of files are analyzed by Zero-Day Protection?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Zero-Day Protection mainly analyzes executable files, scripts, documents and archives. This includes formats such as .exe, .dll, .pdf, .docx, .xlsx, .zip, .rar and many more. Only files smaller than 10 MB are analyzed.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049846381\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>How are suspicious files analyzed?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>The analysis takes place in several steps: First, the file is scanned by the antivirus engine.<br \/>\nIf the file does not contain any known threats but still appears suspicious, it is sent to a sandbox for further analysis, where it is executed in an isolated environment and monitored for malicious behavior. <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049848058\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>How long does the analysis by Zero-Day Protection take?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>The analysis usually takes around five minutes, but can take up to ten minutes depending on the file size and complexity of the analysis.<br \/>\nFor files that have already been analyzed, the analysis time can be less than one second due to caching. <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049849075\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>Will my data be processed securely?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>All files sent to SophosLabs Intelix\u2122 for analysis are transmitted via an encrypted SSL connection and stored asymmetrically encrypted on the servers.<br \/>\nThe files are only decrypted and processed for the duration of the analysis. <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724049996837\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>In which data centers are my files analyzed?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>You can select the data center where your files are analyzed.<br \/>\nAvailable regions include Asia-Pacific (Sydney, Tokyo), Europe (Frankfurt, London) and the United States.<br \/>\nIf you do not select a specific region, the system will use the closest data center based on latency.  <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724050023358\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>What protective measures does Zero-Day Protection offer against ransomware?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Zero-Day Protection includes ransomware detection capabilities, including dynamic analysis that monitors suspicious behavior such as file encryption in real time.<br \/>\nThe system also uses CryptoGuard to detect and stop ransomware attacks. <\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1724050046331\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \"><strong>Is it possible to see which files have been analyzed by Zero-Day Protection?<\/strong><\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Yes, there is a special overview in Sophos Firewall that shows all files and email attachments that have been analyzed by Zero-Day Protection.<br \/>\nHere you can view reports that contain details of the analysis and the corresponding security ratings. <\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"template":"","format":"standard","kb_kategorie":[382],"class_list":["post-161276","kb","type-kb","status-publish","format-standard","hentry","kb_kategorie-sophos-firewall"],"blocksy_meta":[],"acf":[],"_links":{"self":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb\/161276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:attachment":[{"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/media?parent=161276"}],"wp:term":[{"taxonomy":"kb_kategorie","embeddable":true,"href":"https:\/\/www.avanet.com\/en\/wp-json\/wp\/v2\/kb_kategorie?post=161276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}