Self Analysis

This section includes:

About self analysis

You can use Perception Point X‑Ray to analyze a specific file or URL that is suspicious. This is called self-analysis. Perception Point X‑Ray will perform an analysis of the specified file or URL. Scan details are included in the Scans page in Perception Point X‑Ray. Remember to click the Self-analyze filter icon [] to show only Self-analyze scans.

If the file to be analyzed is password protected, you can supply the required password before scanning begins.

Note:

  • The Self-analyze feature is available for organizations that have a commercial contract for Perception Point X‑Ray, not for PoC organizations.

  • The Self-analyze feature is not available to admin users who are associated with parent organizations only - such as MSSP organizations. [Scans can't be performed in parent organizations - only in child organizations.]

  • By default, the largest file that you can scan using the self-analyze feature is 100 MB.

  • You can upload and analyze files with any extension.

  • The "self-analyisis" feature doesn't include the full set of detection engines - results from "self-analyisis" scans may not be as accurate as regular scans that are performed in Perception Point X‑Ray.

    Tip

    To enable a fuller set of detection engines to be applied:

    1. Create a dummy email account - that will be protected by Perception Point X‑Ray.

    2. Create an email, and attach to the email the file that you want to scan.

    3. Send the email to the new dummy account.

    4. In Perception Point X‑Ray, open the Scans page, and locate the results of the scan.

Any admin user with the "Self Analysis" role [or higher] can access the self-analysis feature.

Self-analyzing a file or URL

Note: You can simultaneously upload multiple files for self-analysis.

To self-analyze a file or URL:

  1. On the right of the Perception Point X‑Ray banner, click the Self Analyze icon [].

    File Analysis

     

    Regular files [not password-protected]

    Password-protected files

     

    • Drag and drop the suspicious files, or browse to locate them.

    1. Click upload to be able to enter the password.

    2. Drag-and-drop the suspicious file, or browse to locate it.

    3. Enter the password, and click Analyze.

      Note: If you submit multiple files, the same password will be applied to all the files.

    URL Analysis

    1. Click URL Analysis.

    2. Enter the suspicious URL, and then click Analyze.

  2. Perception Point X‑Ray will analyze the files or URL. Results of the analysis will be shown. You can click any result to see additional details about the analysis.

    Important: It may take a while for the results of the scan to appear.