- Admin permission to your Cloud App Security console
- One Microsoft SharePoint ATP (Advanced Threat Protection) policy with Real-time Scanning enabled
- Permissions for Cloud App Security to receive notifications from Microsoft upon any change to the files in your teams (refer to Online Help - Step 11)
- One or more test SharePoint sites protected by Cloud App Security as selected targets of the test policy
Pattern-Based Scanning
- Download an EICAR file from Download Anti Malware Testfile – Eicar.
- In the Malware Scanning test policy, ensure that "Scan all files" is selected.
- Sign in to https://www.office.com as the test user, locate the SharePoint icon in the left panel, and then click on it to open the SharePoint page.
- Select the test SharePoint site and then upload the eicar file to the Documents folder.
Please use a test site different from the one for Teams and OneDrive, or the sample file will be detected by the Teams policy or OneDrive policy rather than the SharePoint policy.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, confirm that the sample is detected by Pattern-Based Scanning and that the Security Risk Name is “Malware: Eicar_test_file”.
TrendX (Predictive Machine Learning)
- In the Malware Scanning test policy, ensure that “Enable Predictive Machine Learning” is checked.
- Download TrendX.zip and unzip the file with the password “virus”.
- Upload the extracted sample files to the My Files folder.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, confirm that the sample is detected by Predictive Machine Learning and that the Security Risk Name is “Malware: Ransom.Win32.TRX.XXPE1”.
- In the File Blocking test policy, ensure that “Enable File Blocking” is checked and that “Block Specific Files” is selected for “Type of File Blocking”, and then select “File names to block” and add “test.txt” to the Blocking list.
- Create a text file with file name “test.txt” and input any text into it.
- Upload the test.txt file to the Documents folder.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, confirm that the sample is detected with Security Filter “File Blocking” and that the Security Risk Name is “test.txt”.
- In the Web Reputation test policy, ensure that “Enable Web Reputation” is checked.
- Create a text file with file name “wrstest.txt” and input the following WRS test URL into it.
- Upload wrstest.txt to the Documents folder.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, confirm that the sample is detected with the Web Reputation Security Filter and that the Security Risk Name is “Spyware: [http]:[/][/]wrs21[.]winshipway[.]com”.
- In the Virtual Analyzer test policy, ensure that “Enable Virtual Analyzer” is checked.
- Download the PDF sample and unzip it with the password “virus”.
- Upload the extracted sample file to the My Files folder.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, confirm that the sample is detected with Virus Name “HEUR_PDFF.SPACE”.
- Add a test DLP policy for SharePoint Online. Ensure that “Enable Real-time Scanning” is selected and that the SharePoint test site is set as "Selected Targets".
Please use a test site different from the one for Teams and OneDrive, or the sample file will be detected by the Teams policy or OneDrive policy rather than the SharePoint policy.
- Ensure that “Enable Data Loss Prevention” is selected and that “All: Credit Card Number” is set as "Selected Compliance Template(s)".
- Create a text file with some test credit card numbers like below. If you don’t have one, you may find some from Test Payflow Transactions (paypal.com). The following sample file uses the test credit card numbers provided in the PayPal website.
- Upload the created sample file to the Documents folder.
- Wait for several minutes and then in the Logs tab of the CAS Web UI, select "Data Loss Prevention" as the Log Type and then confirm that the sample is detected with the Data Loss Prevention Security Filter.