Skip to main content

Function Specification

※ Last updated: 2026-03-12
The contents of this document may change without prior notice due to product updates.


RFP Notation Standards

NotationMeaningDescription
requiredCommon Evaluation CriteriaCommonly Required Features in File Sanitization (CDR) Project RFP
readerDifferentiation ItemsUnique features of SHIELDEX File provide an advantage over competitors —Recommendation to Add Evaluation Criteria to the RFP
SelectionAdditional ItemsFeatures proposed optionally based on customer requirements

Major CategorySubcategorySubcategoryDetailed DescriptionRFP notation
DecontaminationDecontamination ProcessingDecommissioning Method (CDR)Instead of detecting the malicious nature of a file, it selectively identifies document elements to reconstruct the file.CDRProcessing method. Does not rely on the signature.Zero-Day AttackBlock unknown threats including __PH_0__reader
MS Office Document SanitizationRemove risk factors (macros, OLE objects, DDE, ActiveX, hyperlinks, etc.) from MS Office documents and extract only safe content for recombination.required
PDF Document SanitizationRemove risk factors (JavaScript, Actions, annotations, hyperlinks, etc.) from PDF documents and extract only safe content for recombination.required
Hancom Office Document SanitizationRemove risk elements (objects, hyperlinks, scripts, etc.) from Hancom Office documents and extract only safe content for recombination.required
HTML SanitizationRemove risk elements (scripts, web beacons, hyperlinks, etc.) from the HTML document and extract only safe content for recombination.required
JSON DeserializationRemove risk factors (duplicate keys, executable links, risky keys, operators, etc.) in JSON data.required
Image File SanitizationImage file sanitization andSteganographyDetection and Removalrequired
Decompressing FilesIndividually sanitize sub-files within compressed files (including multi-compressed files)required
File ValidationFile Format IdentificationIdentify document formats based on content rather than file names or extensions, and perform sanitization processing that complies with the identified format.reader
Extension ValidationDetecting extension forgery by checking the match between identified file formats and extensions.required
Vaccine InspectionScan the file with antivirus before decontamination to detect known malware.Selection
File BackupBackup of the original fileEncrypt the original file before decontamination processing.required
Decontamination Complete File BackupStore the file after encryption once the sanitization process is complete.required
DRM IntegrationDecontamination PreprocessingDecryption of DRM files before decontamination processingreader
Decontamination Post-TreatmentDRM encryption after demilitarization processing completereader
Operational Status ManagementSystem StatusResource MonitoringDisplay real-time charts of CPU, memory, and disk usage of the serverrequired
Major Service StatusDisplays the execution status and integrity check results of key services such as the admin web console, decontamination interface, and decontamination service.Selection
Abnormal Symptoms StatusBlocking and Original Import StatusView the trend of the number of files blocked or imported as originals according to policyrequired
Top 10 Blocked and Imported UsersDisplay the top 10 users with frequent block or original import occurrencesrequired
Decontamination StatusStatus of Decontamination ProgressReal-time status of the ongoing demining operations (total, pending, in progress, completed)required
Summary of Decontamination Treatment ResultsMonthly processing results (success/exceptions/blockages) and risk status visualized and summarized.Selection
Decontamination Result ManagementResult InquiryView Results ListCheck the list of decontamination results, risk levels, and detailed information for all processed files.required
Search and FilterSearch and filter by various conditions such as date range, file name, extension, task ID, user, integration system, processing result, and risk level.required
Exporting CSVList of declassification results being queriedCSVDownload in formatrequired
Download Backup FileDownload the original file stored in encrypted form and the file that has been successfully decrypted.required
View Detailed InformationDetailed Result InformationCheck detailed analysis information such as request information for each file, file information (before/after size), user information, processing results, and risk level.required
Time Required TimelineDisplay the decontamination time required in a step-by-step (request → queue → start → complete) timeline in seconds.Selection
Work LogOverall processing flow timeline and system response/engine module informationJSONCheck in the format and use it for technical analysis and debugging.Selection
Forensic DataAnalyze metadata such as creation/modification history, production tools and versions, permission settings, document format, and number of pages to identify the source and risk level of the file.Selection
Compressed File DetailsDetailed verification of the harmlessness results for each sub-file within compressed files such as ZIP, TAR, and 7Z.required
Decontamination Policy ManagementCommon PolicyFile Import Method SettingsSelect the file import method as 'Decontamination Processing' / 'Original Import' / 'Recording Mode'. In recording mode, decontamination processing and results are recorded according to policy, but the import is conducted as the original file.required
Setting the Decontamination Treatment StrengthSet the decontamination processing level. 'Maximum Security' identifies all risk factors and extracts only safe content, while 'Maximum Integrity' selects safe content while maintaining the original structure as much as possible.required
Harmless Extension FilterSpecify the file extensions allowed for decontamination processingrequired
Harmless Deactivation Block Extension FilterSpecify the extensions that block the import itself regardless of the decontamination process.required
Setting Size Limits for Decontamination ProcessingSet the maximum size of files that can be processed for decontamination.required
Blocking settings when the decontamination processing size exceedsSet whether to block files that exceed the specified size limit or to import them as is.required
Password Protected Document Processing SettingsSet whether to block password-protected document files or import them as is.required
Password Protected Compressed File Handling SettingsSet whether to block password-protected compressed files or import them as is.required
Encryption File Processing SettingsSet whether to block files encrypted with DRM or to import them as isrequired
Format Identification Unrecognized File Processing SettingsSet whether to block files that cannot be analyzed due to file corruption or unknown encryption, or to import them as they are.required
Blocked settings for unsupported file extensionsSet the handling method for unsupported file extensions in the system (block / original import / log mode)required
Extension Spoofing Prevention SettingsThe actual format of the file does not match the extension.Extension ForgerySet the file processing method (block / import original / log mode)required
Setting File Path Length Exceed Block 여부Set whether to block or import as is if the file path length exceeds the system's allowed range.required
Exception PolicyForced Import Settings for Specific ExtensionsFiles with the specified extension are imported as is without any sanitization.required
Blocked Exception Settings for Unsupported ExtensionsWhen blocking unsupported file extensions, specify the extensions that are allowed as exceptions for importing original files.required
Extension Spoofing Prevention Exception SettingsSpecify the extensions that are allowed as exceptions for importing originals when blocking extension forgery.required
Unspecified File Extension Import SettingsSet whether to block files without extensions or import them as isrequired
Original Import Settings When Threat Elements Are Not DetectedSet whether to import files that do not contain threats (macros, scripts, etc.) as is or to sanitize them.required
Original Import Settings on TimeoutSetting whether to import as is or block when the decontamination processing time exceeds the set criteria.required
Setting Timeout CriteriaSet the decontamination work time limit in minutesrequired
Import Settings for Original When Decontamination Error OccursSet the handling method (block / original import / log mode) when a system error occurs during the decontamination process.required
MS Office PolicyObject (OLE) Deletion Settings in DocumentInserted in MS Office documentsOLESet whether to remove objects (other documents, executable files, etc.)required
Object Specification Settings to Maintain Within the DocumentSpecify the object to keep as an exception when deleting the OLE objectrequired
Document Macro Processing SettingsIn MS Office documentsVBA MacroSet whether to removerequired
Remove DDEAUTO Setting in DocumentAllows automatic data exchange between documentsDDESet whether to remove the featurerequired
Remove ActiveX Control Settings in DocumentEnabling interaction in the documentActiveXSet whether to remove the controlrequired
Setting ActiveX Content to be Maintained in the DocumentSpecify ActiveX content to retain as an exception when removing ActiveX controls.required
Blocking settings for documents from versions prior to MS Office 97Set whether to block files from MS Office versions prior to 97 that do not meet modern security standardsrequired
Setting to Remove OLE External Links in DocumentSet whether to remove OLE external links that connect to external files or web addresses in the document.required
Remove Hyperlink Settings in DocumentConnecting to external files, web addresses, etc. within the documenthyperlinkSet whether to removerequired
PDF PolicySettings for Processing Digitally Signed PDFsSet whether to import the PDF document with a digital signature as is or to sanitize it.required
PDF JavaScript Removal SettingsSet whether to remove JavaScript that can trigger the execution of malicious code in PDF documentsrequired
Remove PDF Action SettingsSet whether to remove Actions that trigger specific tasks in a PDF document.required
PDF Annotation Removal SettingsSet whether to remove annotations (notes, highlights, etc.) that may contain malicious code or links in PDF documents.required
PDF Annotation Exception SettingsSpecify the annotation types to keep as exceptions when removing PDF annotations.required
Hancom Office PolicySettings for Removing Objects in Hancom Office DocumentsSet whether to remove OLE objects inserted in Hancom Office documentsrequired
Setting to Remove Hyperlinks in Hancom Office DocumentsSet whether to remove hyperlinks in Hancom Office documentsrequired
Hancom Office Document Script Removal SettingsSet whether to remove scripts that control or automate the operation of Hancom Office documents.required
Setting Object Retention in Hancom Office DocumentsSpecify the object to keep as an exception when removing OLE objects.required
Hancom Office Distribution Document Blocking SettingsSet whether to block the Hancom Office file created as 'deployment document' or to import it as is.required
Blocking the Creation of Non-Standard MS Office Files in Hancom OfficeSet whether to block non-standard MS Office files created in Hancom Office or to import them as is.required
HTML PolicyHTML Script Removal SettingsSet whether to remove scripts that perform dynamic functions within the web page.required
HTML Web Beacon Removal SettingsSet whether to remove web beacons that track user behavior on web pagesrequired
Remove HTML Hyperlink SettingsSet whether to remove hyperlinks that connect to external files, web pages, etc. within the web page.required
JSON PolicySetting to Block Duplicate Keys in JSONJSONSet block status if duplicate keys are included in the datarequired
Blocking settings for specified executable linksJSONBlock specified executable links in the data (e.g., javascript, powershell, etc.)required
Blocking settings for specified built-in file formats (MIME)JSONThe specified built-in file format in the data (MIME typeto blockrequired
Blocking Configuration for Designated Risk KeysJSONthe specified risk key in the data (e.g.:proto, blocking constructors, etc.required
Setting Blocked OperatorsJSONBlock the specified operators in the data (e.g., $where, $eval, etc.)required
Compressed File PolicyLimit on the Number of Items in a Compressed FileSet the upper limit on the number of files that can be included in a compressed file.required
Compression File Subdirectory Depth LimitSet the maximum depth of nested compression in the compressed filerequired
Image File PolicyImage Processing Intensity SettingsSet the processing intensity of image files. 'Maximum Security' isSteganographyRemove up to, 'maximum consistency' preserves the original quality as much as possible.required
Encryption PolicyOriginal File Encryption SettingsSet whether to perform encryption on the original filerequired
Decryption File Encryption SettingsSet whether to perform encryption on the completed decontamination file.required
Integration System Policy ManagementIntegration System ManagementRegister the external system to be integrated, issue an API Key, and set the default de-identification policy for that system.required
Setting Policy Expiration DateSpecify the expiration period for each policy item, automatically switching to the default decontamination policy after expiration.Selection
Individual Policy ManagementMember ManagementManage individual policy application targets by adding or removing users or groups as policy subjects.required
Individual Policy ManagementCreate individual policies to apply different policies for users or groups, and delete unnecessary policies.required
Setting Policy Expiration DateSpecify expiration dates for individual policy items so that the individual policies no longer apply after expiration.Selection
ReportSystem Performance StatisticsResource Utilization SummarySet the query unit (10 minutes/1 hour/1 day) and period to summarize the average values of CPU, memory, and disk usage.required
Performance Overview ChartVisualizing CPU, Memory, Disk, and Network as Time Interval Graphsrequired
Network Transmission SummaryDisplay the total network reception and transmission volume (MB) during the query period.Selection
Visualization DownloadCharts and Data in SVG, PNG,CSVDownload in formatSelection
Influx and Processing StatisticsCDR Result DistributionCDRDisplay the ratio of processing results (success/exception/block) in a pie chart and summary list.required
Traffic Statistics by PeriodVisualizing the number of incoming files by date as a bar chartrequired
Traffic Statistics by ExtensionDisplay the distribution of incoming traffic by file extension in a bar graph.Selection
Statistics by Integrated SystemProvides the number of inflows, imports, and blocks by linked system, as well as reasons for blocking (encrypted files, unsupported extensions, tampering, etc.) in charts and tables.Selection
Content Risk StatisticsRisk Distribution by GradeVisualize the 6-level risk ratio from 'Safety' to 'Tampering' using a pie chart, and display the representative content types and counts for each grade.required
Threat Element Inflow StatisticsDisplay the detection counts by threat element in a bar graph and data table.Selection
Log ManagementPolicy Change HistoryChange History InquiryView the policy change history as a list and check detailed information such as the previous/changed policy values and reasons for the changes for each record.required
Restoring HistoryRestore the changed policy to its previous state and enter the reason for restoration to record the restoration history.Selection
Admin Audit LogView Audit LogsView audit logs of administrator actions (menu access, configuration changes, etc.) in chronological order, and filter by period, type, and keywords to check detailed information.required
Exporting CSVView and Filtered Audit LogsCSVDownload in formatSelection
API Request LogView API Request LogsView the decontamination API request records of the integration system in chronological order, and filter by integration system, request results, etc.Selection
Admin SettingsAccount and Permission ManagementAdmin Account ManagementViewing, registering, modifying, deleting, and changing the password of the administrator account. Access rights are distinguished according to the administrator type (system/channel).required
Web Console Access Control Management (IP)IP-based Access ControlSet the access control mode (Allow All / Whitelist) for the admin web console and specify the allowedIPv4Manage Addressesrequired
Data Organization Schedule ManagementSetting Up a DB Data Cleanup ScheduleSet the activation status of the DB table cleanup schedule, execution frequency, and retention period for each table.Selection
View DB Data Cleanup ResultsCheck the consolidation execution date, data size before and after consolidation, and the number of records.Selection
Setting Up File Data Organization ScheduleSet the activation status of the file data organization schedule, execution frequency/day/time, and retention period by path.Selection
File Data Organization Results ViewCheck the cleanup execution date, storage capacity before and after cleanup, and the number of files.Selection
Integrity Check ManagementIntegrity Check SettingsSet the activation status of integrity checks (service status checks) and the automatic check repetition interval.Selection
Manual Inspection ExecutionPerform immediate integrity checkSelection
Inspection History InquiryDisplay the inspection date, method, number of subjects, number of successes/errors in a list, and check detailed information such as service status and integrity status for each history.Selection
Server ManagementServer Information RetrievalView the server list (ID, server name, representative IP:Port, etc.) and detailed information for each server such as IP, MAC address, registration/modification date, etc.Selection
Service ManagementService InquiryCheck the list of installed service modules and detailed information for each service, such as name, version, running status, port, memory usage, etc.Selection
Service RestartRestart the selected service (stop and restart if it is currently running)Selection
Configuration File ManagementView and manage service configuration files and register patch filesSelection
Control History InquiryCheck service control operation records (date, time, service name, administrator ID, reason for change, etc.) in list and detail view.Selection