Skip to content

File sandboxing

In addition to anti-virus (AV) scanning, Gateway can quarantine previously unseen files downloaded by your users into a sandbox and scan them for malware.

When a file download passes AV scanning without a malware detection, Gateway quarantines the file in the sandbox. If the file has not been downloaded before, Gateway monitors the file's behavior and compares it to known malware patterns. During this process, Gateway displays an interstitial page in the user's browser. If the sandbox does not detect malicious activity, Gateway releases the file and downloads it to the user's device. If the sandbox detects malicious activity, Gateway blocks the download. For any subsequent downloads of the same file, Gateway remembers and applies its previous allow/block decision.

Gateway will log any file sandbox decisions in your HTTP logs.

flowchart TD
    A(["User starts file download"]) --> B["File sent to AV scanner"]
    B --> C["Malicious file detected?"]
    C -- Yes --> D["Download blocked"]
    C -- No --> G["File sent to sandbox"]
    G --> n1["First time file downloaded?"]
    K["Malicious activity detected?"] -- Yes --> N["Download blocked"]
    K -- No --> n3["Download allowed"]
    n2["Interstitial page displayed for user during scan"] --> n4["File activity monitored"]
    n1 -- Yes --> n2
    n4 --> K
    n1 -- No --> K

    B@{ shape: subproc}
    C@{ shape: hex}
    D@{ shape: terminal}
    n1@{ shape: hex}
    K@{ shape: hex}
    N@{ shape: terminal}
    n3@{ shape: terminal}
    n2@{ shape: display}
    n4@{ shape: rect}
    style D stroke:#D50000
    style N stroke:#D50000
    style n3 stroke:#00C853

Get started

To begin quarantining downloaded files, turn on file sandboxing:

  1. In Cloudflare One, go to Traffic policies > Traffic settings.
  2. In Policy settings, turn on Open previously unseen files in a sandbox environment.
  3. (Optional) To block requests containing non-scannable files, select Block requests for files that cannot be scanned.

You can now create Quarantine HTTP policies to determine what files to scan in the sandbox.

Create test policy

To test if file sandboxing is working, you can create a Quarantine policy that matches the Cloudflare Sandbox Test:

  1. In Cloudflare One, go to Traffic policies > Firewall policies > HTTP.

  2. Select Add a policy.

  3. Add the following expression:

    SelectorOperatorValueAction
    Hostissandbox.cloudflaredemos.comQuarantine
  4. In Sandbox file types, select ZIP Archive (zip).

  5. From a device connected to your Zero Trust organization, open a browser and go to the Cloudflare Sandbox Test.

  6. Select Download Test File.

Gateway will quarantine and scan the file, display an interstitial status page in the browser, then release the file for download.

Sandbox environment

Gateway executes quarantined files in a sandboxed Windows operating system environment. Using machine learning, the sandbox compares how files of a certain type behave compared to how these files should behave. The sandbox detects file actions down to the kernel level and compares them against a real-time malware database. In addition, Gateway checks the sandbox's network activity for malicious behavior and data exfiltration.

Compatibility

Supported file types

File sandboxing supports scanning the following file types:

Supported sandboxing file types

  • .exe
  • .pdf
  • .doc
  • .docm
  • .docx
  • .rtf
  • .ppt
  • .pptx
  • .xls
  • .xlsm
  • .xlsx
  • .zip
  • .rar

Non-scannable files

Gateway cannot scan requests containing the following files:

  • Files larger than 100 MB
  • PGP encrypted files