Local Reputation Service

The Local Reputation Service allows your organization to influence threat decisions by managing known good and bad files and indicators. You can supply your own local reputation data, and our system also includes managed reputation entries out of the box.

This feature is available since version 2.3.0.

Use comments in your reputation files to keep track of sources—just add a description after a comma!

Supported Data Types

Sandbox supports reputation entries for the following data types:

  • md5 – File hash (32-character)
  • sha256 – File hash (64-character)
  • ip – IPv4 or IPv6 addresses
  • domain – Network domain names
  • url – Full URLs
  • digicert_owner – Digital Certificate owners (common name / organization)

Each entry can be part of either an allow list or a block list, to determine whether files or indicators (IOCs) should be trusted or flagged.

Only allowed entries are supported for Digital Certificate owners.

Sandbox cannot verify certificates in offline environments, therefore the certificate allowlist is ignored for allow listing.

Directory Structure

Reputation data is stored in the following directories:

  • System-managed data: <sandbox>/transform/data/reputation/internal(Shipped with each release and updated automatically after install)
  • Customer-provided data: <sandbox>/transform/data/reputation/external(Customers can edit and manage this at any time)

Customer managed data takes precedence on conflict.

System managed data should not be overwritten. The system will revert any modifications on installation.

File Naming Convention

Customers can provide their reputation data in files following this naming format:

Data TypeAllow list fileBlock list file
MD5md5_allowed.txtmd5_blocked.txt
SHA256sha256_allowed.txtsha256_blocked.txt
IPip_allowed.txtip_blocked.txt
Domaindomain_allowed.txtdomain_blocked.txt
URLurl_allowed.txturl_blocked.txt
Digital Certificate ownerdigicert_owner_allowed.txt(no block list supported)

File Format

Each file - except digicert_owner_allowed.txt - can contain single line entries as comma separated data and optional description pairs.

CSV
Copy

Examples:

md5_allowed.txt
Copy

For digicert_owner_allowed.txt, description is not supported.

Example:

digicert_owner_allowed.txt
Copy

Import Behavior

  • Data is imported at application startup, if a file has changed.
  • If a file changes, existing data for that type and list is replaced entirely.
  • All internal (system-managed) reputation data is updated after installation.
  • External (customer) reputation data can be modified and re-imported at any time.

Restart Sandbox to trigger the data import

Bash
Copy

Validation and Logs

  • All entries are validated during import based on type.
  • Invalid entries are skipped silently.
  • To ensure full effectiveness, customers advised to check the logs for any skipped entries or formatting errors.

Example transform logs for successful import and migration with an invalid data entry:

It is advised to check the logs for any skipped entries or formatting errors.

Import log
Copy

Migration of Old External Data

  • Legacy external reputation data is automatically migrated during the first startup after the installation of version 2.3.0 or later.
  • A migration marker file indicates completion of the migration step: <sandbox>/transform/data/reputation/external/.reputation_migration_completed

Additional Allow List Behavior

  • URL Matching: A URL is allowed or blocked based on its domain's presence in the allow/block list.
  • IP Matching: An IP is considered allowed if it:
    • Matches exactly
    • Is a network address - see transform configuration setting ignoreNetworkIPs
    • Is a broadcast address - see transform configuration setting ignoreBroadcastIPs
    • Falls within an allowed subnet - see transform configuration setting whitelistHostsCIDR
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard