This website uses Cookies. Click Accept to agree to our website's cookie use as described in our Privacy Policy. Click Preferences to customize your cookie settings.
This section of Google Threat Intelligence Onboarding is going to cover the administration of Google TI’s Private Scanning. Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. Files and URLs uploaded via this offering won't be shared with anyone beyond the user’s organization, and will remain in Google TI only for a brief period of time. The resulting analyses will be ephemeral too and only visible to your Google TI group.
Note that private analyses won't contain antivirus verdicts, they will contain only the output of all the other characterization and contextualization tools that we run, including sandboxes.
Prerequisites
Access to the Homepage and its features, requires the user to have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Actions
Analyzing Files
Google Threat Intelligence’s Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. Files and URLs uploaded via this offering won't be shared with anyone beyond the user’s organization, and will remain in Google TI only for a brief period of time.
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Steps
On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Private Scanning option in the menu.
The Private Scanning page will appear. In the top left corner of the page, there will be two option tabs to select:
Scan
Analyses
In Scan page, users will have two upload options:
File
URL
To enter a File, users will select Choose File, where an upload window will appear for users to select a file to upload.
Users will be will be prompted to choose a File from their computer. After the File is chosen users will be requested to confirm the upload.
To the right of the Choose File button is a feature to select options in a Scan Configuration window.
This window has multiple selection options:
Try to Detonate in Dynamic Analysis Sandboxes
Enable Live Interaction
Sandbox
Interaction Timeout
Enable Internet Access
Intercept HTTPS/ TLS Connections
Retention Period (Days)
Storage Region
With Enable Live interaction selected, users can choose the desired sandbox and maximum timeout.
Google Threat Intelligence’s Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. Files and URLs uploaded via this offering won't be shared with anyone beyond the user’s organization, and will remain in Google TI only for a brief period of time.
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Steps
On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Private Scanning option in the menu.
The Private Scanning page will appear. In the top left corner of the page, there will be two option tabs to select:
Scan
Analyses
In Scan page, users will have two upload options:
File
URL
When a File has been analyzed, a Private Scanning File Report will appear.
If the File is already available in the standard Google TI Open Corpus, users will be informed accordingly and may navigate to the corresponding shared corpus report.
Full analysis can take several minutes to complete. Users will be redirected to the Report View upon completion.
Under the Analyses, users will be able to view previous or recent Scans. These private Analyses will appear in a list below, as this list will only include Analyses of Files or URLs submitted by the user’s organization.
Google Threat Intelligence’s Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. One of the most useful and differentiated features of Private Scanning is pivoting to other similar files in the open Google TI ENTERPRISE corpus.
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Steps
On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Private Scanning option in the menu.
The Private Scanning page will appear. In the top left corner of the page, there will be two option tabs to select:
Scan
Analyses
Once a Private Scanning report is complete, users will be able to pivot to other similar files in the Open Google TI shared corpus, by selecting the Similar dropdown button.
There users will be able to see Similarity Analysis information listed Similar By:
Google Threat Intelligence’s Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. Files and URLs uploaded via this offering won't be shared with anyone beyond the user’s organization, and will remain in Google TI only for a brief period of time.
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Steps
On the main page of Google Threat Intelligence Platform, go to the Left Navbar to select Private Scanning option in the menu.
The Private Scanning page will appear. In the top left corner of the page, there will be two option tabs to select:
Scan
Analyses
On the Scan page, users have two upload options:
File
URL
If the user selects Scan a URL, the user will enter a URL in the Search box.
To the right of the Scan a URL entry box, is a selection button where users will select the Retention Period Days and Storage Region.
When complete, users will select Apply.
Once the URL is uploaded users will be redirected to the Report View.
Google Threat Intelligence’s Private Scanning allows users to analyze files and URLs with Google TI in a privacy preserving fashion. Files and URLs uploaded via this offering won't be shared with anyone beyond the user’s organization, and will remain in Google TI only for a brief period of time.
Access requires users have access, and a valid authentication. Users must be provided access and authentication from the organization’s administrator(s).
Private Scanning is a paid offering and users will need specific privileges to access it.
Steps
Once a URL is scanned, the URL Analysis page will appear. At the top of the page, users will see a banner, reminding them, that this feature is a Private Scanning area, and files will not be shared or made public.
At the top of the URL Analysis report page, users will see the URL scanned with three options:
Reanalyze
Search
Graph
The Search feature will allow users to look for the URL in the Google TI shared corpus.
By selecting Graph,users will be able to search for Threat Graphs associated with the URL scanned.
The report will contain the output of other analysis and contextualization tools possessed by Google TI.
The Details tab will contain information about the scanned resource, to include:
HTTP Response
Redirection Chain
The Redirection Chain will list all Redirections until the final URL under study is reached (Limited to 5 Redirections).
The Behavior tab will contain the following information: