Join in and help us grow
Videos to help you get set started
Got a Question? Please let us know
Do you have an example ContentManagement XML file that includes the new (to me) archiveConfig section?
When setting up a content management policy make sure you add a list of file types you want to be set on hold to prevent them from harming your system Here is the list of potentially malicious file types. There are four main sections: Programs .EXE – An executable program file. Most of the applications running on Windows are .exe files. .PIF – A program information file for MS-DOS programs. While .PIF files aren’t supposed to contain executable code, Windows will treat .PIFs the same as .EXE files if they contain executable code. .APPLICATION – An application installer deployed with Microsoft’s ClickOnce technology. .GADGET – A gadget file for the Windows desktop gadget technology introduced in Windows Vista. .MSI – A Microsoft installer file. These install other applications on your computer, although applications can also be installed by .exe files. .MSP – A Windows installer patch file. Used to patch applications deployed with .MSI files. .COM – The original type of pro
Archive Support The Archive Support functionality adds value by providing you with the reassurance and confidence to safely receive archive files. Archive Support: Features This feature leverages our existing patented CDR technology to clean and rebuild multiple documents in an archive file to match their known good manufacturer’s standard. The file types that are supported are Zip, Tar, GZip, 7Zip, and Rar. Some Archive file types cannot be rebuilt into the same file type; for these, the replacement file types are also shown below: Incoming File Type Rebuilt File Type Zip Zip Tar Tar GZip GZip 7Zip Zip Rar Zip How does it work and how can I help test? Create an archive file and send it to your domain email address. You can
Users receive files on their work computers in a variety of ways. Use the Glasswall Desktop app to automatically remove potential threats from files (including threats AV software hasn’t detected yet).The Glasswall Desktop app gives users the ability to drag and drop files from the outside world into the Glasswall CDR Platform – so they’re free to use files without risk.How it worksThe Glasswall Desktop App uses the patented Glasswall CDR Platform to inspect, clean and rebuild every file to its known good state in real-time–proactively protecting your organization against the most persistent and complex file-based threats.Follow the article in the link below for more information on how to download and install Glasswall Desktop App: https://glasswall-desktop.com/ Architecture DiagramGW Desktop ArchitectureKey BenefitsEnable users to work risk-free with any file received outside your organization Instantly disarm threats in files from unknown sources (e.g. a customer’s USB drive) Users g
Glasswall Web App gives users the freedom to work with files risk-free across their devices by simply drag and drop files from the outside world and instantly remove potential threats – even the ones AV solutions haven’t detected yet. How it worksThe Glasswall Web App uses the patented Glasswall CDR Platform to inspect, clean and rebuild every file to its known good state in real-time–proactively protecting your organization against the most persistent and complex file-based threats. Follow the article in the link below to test drive Glasswall Web app: https://www.glasswallsolutions.com/test-drive/Architecture diagramGlasswall Web App Architecture diagram Data Flow diagramGlasswall Web App Data Flow diagram Demo VideoKey benefitsEnable users to work risk-free with any file received outside your organization Instantly disarm threats in files from unknown sources (e.g. a customer’s USB drive) Give users immediate feedback on identified risks in a file and how it was removed Both original
Glasswall CDR Platform Unlike traditional detection-based security methods that play catch up with new threats, Glasswall’s CDR (Content, Disarm & Reconstruction) technology instantly cleans and rebuilds every file to match its ‘known good’ industry specifications, to remove potential malware. Without sacrificing productivity, the Glasswall CDR platform ensures every file is safe. Glasswall CDR platform is built on flexible and scalable infrastructure using Compliant Kubernetes, so you can spin up CDR clusters to suit your needs. Our platform is security hardened and compliance-ready for total peace of mind, so you can be the security team that drives business forward, no matter what’s ahead.Why Glasswall CDR? Ensure every file entering your organization is safe. Easily set your own risk criteria for how files are used in your organization. Flexible & scalable processing for any file volume. It’s refreshingly easy to deploy. Protect your organisation from malware wit
Proxy Servers or Application Delivery Controllers are standard elements within the network to separate trust boundaries. Network appliances that support the Internet Content Adaptation Protocol (ICAP) are used to provide an industry standard way to support transparent SSL inspection to disarm and rebuild dangerous files by Glasswass CDR.How it worksUsing the Glasswall ICAP Plug-in files are processed by Glasswall CDR Platform with millisecond speed and returned free from threats so they can be safely opened and viewed by the user. Architecture OverviewImplemented as a K8s service Easy to deploy within ICAP Service cluster Interacts with Adaptation Service with RabbitMQ Accessible on : http/80 & https/443Architecture DiagramThe C# service receives files for a rebuild on the REST API endpoints. After preliminary processing (at least must verify the file has been received), the request is passed to the Adaption Service with Adaption request RabbitMQ message. The file to be reb
The Glasswall Cross Domain Plug-in removes potential threats from files crossing multiple domains in and out of private or public networks. The Plug-in mediates the flow of files from a source location (e.g. Dropbox) onto the Glasswall CDR Platform which instantly cleans and rebuilds files to match their known good manufacturer's specification – then places the safe file to a destination location which is typically in a higher trust zone. How it worksCDR implementations can be chained together, as they span different domains to ensure that the process is double-blind. Files are processed in dedicated Kubernetes Pods and Containers which are destroyed once a sanitized file is emitted, ensuring the integrity of the environment. Key benefitsGlasswall CDR platform is context agnostic about how the Cross Domain air-gap is established Multiple connectors available to define how the Cross Domain Plug-in communicates with storage repositories before passing the file to the Glasswall CDR Plat
Microsoft 365 and SharePoint subscribers rely on these servers for collaboration across internal and external teams. These dynamic environments increase security risks–especially when opened to external parties.Glasswall SharePoint Plug-in secures collaboration with proactive file protection that guards against malicious links and other unknown threats enabling you to reduce risk while increasing productivity.How it worksThe Glasswall Sharepoint Plug-in uses the patented Glasswall CDR Platform to inspect, clean and rebuild every file to its known good state in real-time–proactively protecting your organization against the most persistent and complex file-based threats. Glasswall Sharepoint Plug-in ServerGlasswall Sharepoint Plug-in Server Glasswall Sharepoint Plug-in OnlineGlasswall Sharepoint Plug-in OnlineSequence Diagram Key benefitsScalable, secure threat removal and data loss prevention Threat protection and data loss prevention that goes beyond standard antivirus solutions Stop i
Glasswall Product Documentation Glasswall product documentation can be found here: https://docs.glasswallsolutions.com
Glasswall is seeking you insights on which cloud storage platforms are valuable to you. This input will guide our prioritisation of work to integrate with and support these platforms. Please complete this very quick (1 minute) survey question to have your say https://www.proprofs.com/survey/t/?title=pgbiz Of course are also happy to hear from you if you want to respond in the community forum here or ask any questions about this. Thanks from the Glasswall Customer Team
Glasswall collects and stores metadata about each file we process for our customers. This allows us to report all kinds of insights from that metadata. Most of you should be receiving by email a monthly summary report of email and files processed through your account. Any feedback on the format and content of that report would be valuable to us.What other insights would be valuable to you ? Here are some ideas to get you thinking:Insights on what malware files sent to us for processing More insights to help refine the policies in the Glasswall portal Breakdowns by receiver domains Any thoughts you have for us on reporting would be great to hear.
GW doesn’t process encrypted files as that could need a key to decrypt.
Trouble finding what you are looking for? Try using the search bar on the homepage of the community. If you want to raise a support query please go to the “Contact Support” tab at the bottom of the home page of the community.
Got any feedback or suggestions? Submit and vote on product ideas.
Can't find what you're looking for? Ask it here!
Contact our support team and we'll be happy to help you get up and running!
Already have an account? Login
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.