| Decontamination | Decontamination Processing | Decommissioning Method (CDR) | Instead of detecting the malicious nature of a file, it selectively identifies document elements to reconstruct the file.CDRProcessing method. Does not rely on the signature.Zero-Day AttackBlock unknown threats including __PH_0__ | reader |
| | MS Office Document Sanitization | Remove risk factors (macros, OLE objects, DDE, ActiveX, hyperlinks, etc.) from MS Office documents and extract only safe content for recombination. | required |
| | PDF Document Sanitization | Remove risk factors (JavaScript, Actions, annotations, hyperlinks, etc.) from PDF documents and extract only safe content for recombination. | required |
| | Hancom Office Document Sanitization | Remove risk elements (objects, hyperlinks, scripts, etc.) from Hancom Office documents and extract only safe content for recombination. | required |
| | HTML Sanitization | Remove risk elements (scripts, web beacons, hyperlinks, etc.) from the HTML document and extract only safe content for recombination. | required |
| | JSON Deserialization | Remove risk factors (duplicate keys, executable links, risky keys, operators, etc.) in JSON data. | required |
| | Image File Sanitization | Image file sanitization andSteganographyDetection and Removal | required |
| | Decompressing Files | Individually sanitize sub-files within compressed files (including multi-compressed files) | required |
| File Validation | File Format Identification | Identify document formats based on content rather than file names or extensions, and perform sanitization processing that complies with the identified format. | reader |
| | Extension Validation | Detecting extension forgery by checking the match between identified file formats and extensions. | required |
| | Vaccine Inspection | Scan the file with antivirus before decontamination to detect known malware. | Selection |
| File Backup | Backup of the original file | Encrypt the original file before decontamination processing. | required |
| | Decontamination Complete File Backup | Store the file after encryption once the sanitization process is complete. | required |
| DRM Integration | Decontamination Preprocessing | Decryption of DRM files before decontamination processing | reader |
| | Decontamination Post-Treatment | DRM encryption after demilitarization processing complete | reader |
| Operational Status Management | System Status | Resource Monitoring | Display real-time charts of CPU, memory, and disk usage of the server | required |
| | Major Service Status | Displays the execution status and integrity check results of key services such as the admin web console, decontamination interface, and decontamination service. | Selection |
| Abnormal Symptoms Status | Blocking and Original Import Status | View the trend of the number of files blocked or imported as originals according to policy | required |
| | Top 10 Blocked and Imported Users | Display the top 10 users with frequent block or original import occurrences | required |
| Decontamination Status | Status of Decontamination Progress | Real-time status of the ongoing demining operations (total, pending, in progress, completed) | required |
| | Summary of Decontamination Treatment Results | Monthly processing results (success/exceptions/blockages) and risk status visualized and summarized. | Selection |
| Decontamination Result Management | Result Inquiry | View Results List | Check the list of decontamination results, risk levels, and detailed information for all processed files. | required |
| | Search and Filter | Search and filter by various conditions such as date range, file name, extension, task ID, user, integration system, processing result, and risk level. | required |
| | Exporting CSV | List of declassification results being queriedCSVDownload in format | required |
| | Download Backup File | Download the original file stored in encrypted form and the file that has been successfully decrypted. | required |
| View Detailed Information | Detailed Result Information | Check detailed analysis information such as request information for each file, file information (before/after size), user information, processing results, and risk level. | required |
| | Time Required Timeline | Display the decontamination time required in a step-by-step (request → queue → start → complete) timeline in seconds. | Selection |
| | Work Log | Overall processing flow timeline and system response/engine module informationJSONCheck in the format and use it for technical analysis and debugging. | Selection |
| | Forensic Data | Analyze metadata such as creation/modification history, production tools and versions, permission settings, document format, and number of pages to identify the source and risk level of the file. | Selection |
| | Compressed File Details | Detailed verification of the harmlessness results for each sub-file within compressed files such as ZIP, TAR, and 7Z. | required |
| Decontamination Policy Management | Common Policy | File Import Method Settings | Select the file import method as 'Decontamination Processing' / 'Original Import' / 'Recording Mode'. In recording mode, decontamination processing and results are recorded according to policy, but the import is conducted as the original file. | required |
| | Setting the Decontamination Treatment Strength | Set the decontamination processing level. 'Maximum Security' identifies all risk factors and extracts only safe content, while 'Maximum Integrity' selects safe content while maintaining the original structure as much as possible. | required |
| | Harmless Extension Filter | Specify the file extensions allowed for decontamination processing | required |
| | Harmless Deactivation Block Extension Filter | Specify the extensions that block the import itself regardless of the decontamination process. | required |
| | Setting Size Limits for Decontamination Processing | Set the maximum size of files that can be processed for decontamination. | required |
| | Blocking settings when the decontamination processing size exceeds | Set whether to block files that exceed the specified size limit or to import them as is. | required |
| | Password Protected Document Processing Settings | Set whether to block password-protected document files or import them as is. | required |
| | Password Protected Compressed File Handling Settings | Set whether to block password-protected compressed files or import them as is. | required |
| | Encryption File Processing Settings | Set whether to block files encrypted with DRM or to import them as is | required |
| | Format Identification Unrecognized File Processing Settings | Set whether to block files that cannot be analyzed due to file corruption or unknown encryption, or to import them as they are. | required |
| | Blocked settings for unsupported file extensions | Set the handling method for unsupported file extensions in the system (block / original import / log mode) | required |
| | Extension Spoofing Prevention Settings | The actual format of the file does not match the extension.Extension ForgerySet the file processing method (block / import original / log mode) | required |
| | Setting File Path Length Exceed Block 여부 | Set whether to block or import as is if the file path length exceeds the system's allowed range. | required |
| Exception Policy | Forced Import Settings for Specific Extensions | Files with the specified extension are imported as is without any sanitization. | required |
| | Blocked Exception Settings for Unsupported Extensions | When blocking unsupported file extensions, specify the extensions that are allowed as exceptions for importing original files. | required |
| | Extension Spoofing Prevention Exception Settings | Specify the extensions that are allowed as exceptions for importing originals when blocking extension forgery. | required |
| | Unspecified File Extension Import Settings | Set whether to block files without extensions or import them as is | required |
| | Original Import Settings When Threat Elements Are Not Detected | Set whether to import files that do not contain threats (macros, scripts, etc.) as is or to sanitize them. | required |
| | Original Import Settings on Timeout | Setting whether to import as is or block when the decontamination processing time exceeds the set criteria. | required |
| | Setting Timeout Criteria | Set the decontamination work time limit in minutes | required |
| | Import Settings for Original When Decontamination Error Occurs | Set the handling method (block / original import / log mode) when a system error occurs during the decontamination process. | required |
| MS Office Policy | Object (OLE) Deletion Settings in Document | Inserted in MS Office documentsOLESet whether to remove objects (other documents, executable files, etc.) | required |
| | Object Specification Settings to Maintain Within the Document | Specify the object to keep as an exception when deleting the OLE object | required |
| | Document Macro Processing Settings | In MS Office documentsVBA MacroSet whether to remove | required |
| | Remove DDEAUTO Setting in Document | Allows automatic data exchange between documentsDDESet whether to remove the feature | required |
| | Remove ActiveX Control Settings in Document | Enabling interaction in the documentActiveXSet whether to remove the control | required |
| | Setting ActiveX Content to be Maintained in the Document | Specify ActiveX content to retain as an exception when removing ActiveX controls. | required |
| | Blocking settings for documents from versions prior to MS Office 97 | Set whether to block files from MS Office versions prior to 97 that do not meet modern security standards | required |
| | Setting to Remove OLE External Links in Document | Set whether to remove OLE external links that connect to external files or web addresses in the document. | required |
| | Remove Hyperlink Settings in Document | Connecting to external files, web addresses, etc. within the documenthyperlinkSet whether to remove | required |
| PDF Policy | Settings for Processing Digitally Signed PDFs | Set whether to import the PDF document with a digital signature as is or to sanitize it. | required |
| | PDF JavaScript Removal Settings | Set whether to remove JavaScript that can trigger the execution of malicious code in PDF documents | required |
| | Remove PDF Action Settings | Set whether to remove Actions that trigger specific tasks in a PDF document. | required |
| | PDF Annotation Removal Settings | Set whether to remove annotations (notes, highlights, etc.) that may contain malicious code or links in PDF documents. | required |
| | PDF Annotation Exception Settings | Specify the annotation types to keep as exceptions when removing PDF annotations. | required |
| Hancom Office Policy | Settings for Removing Objects in Hancom Office Documents | Set whether to remove OLE objects inserted in Hancom Office documents | required |
| | Setting to Remove Hyperlinks in Hancom Office Documents | Set whether to remove hyperlinks in Hancom Office documents | required |
| | Hancom Office Document Script Removal Settings | Set whether to remove scripts that control or automate the operation of Hancom Office documents. | required |
| | Setting Object Retention in Hancom Office Documents | Specify the object to keep as an exception when removing OLE objects. | required |
| | Hancom Office Distribution Document Blocking Settings | Set whether to block the Hancom Office file created as 'deployment document' or to import it as is. | required |
| | Blocking the Creation of Non-Standard MS Office Files in Hancom Office | Set whether to block non-standard MS Office files created in Hancom Office or to import them as is. | required |
| HTML Policy | HTML Script Removal Settings | Set whether to remove scripts that perform dynamic functions within the web page. | required |
| | HTML Web Beacon Removal Settings | Set whether to remove web beacons that track user behavior on web pages | required |
| | Remove HTML Hyperlink Settings | Set whether to remove hyperlinks that connect to external files, web pages, etc. within the web page. | required |
| JSON Policy | Setting to Block Duplicate Keys in JSON | JSONSet block status if duplicate keys are included in the data | required |
| | Blocking settings for specified executable links | JSONBlock specified executable links in the data (e.g., javascript, powershell, etc.) | required |
| | Blocking settings for specified built-in file formats (MIME) | JSONThe specified built-in file format in the data (MIME typeto block | required |
| | Blocking Configuration for Designated Risk Keys | JSONthe specified risk key in the data (e.g.:proto, blocking constructors, etc. | required |
| | Setting Blocked Operators | JSONBlock the specified operators in the data (e.g., $where, $eval, etc.) | required |
| Compressed File Policy | Limit on the Number of Items in a Compressed File | Set the upper limit on the number of files that can be included in a compressed file. | required |
| | Compression File Subdirectory Depth Limit | Set the maximum depth of nested compression in the compressed file | required |
| Image File Policy | Image Processing Intensity Settings | Set the processing intensity of image files. 'Maximum Security' isSteganographyRemove up to, 'maximum consistency' preserves the original quality as much as possible. | required |
| Encryption Policy | Original File Encryption Settings | Set whether to perform encryption on the original file | required |
| | Decryption File Encryption Settings | Set whether to perform encryption on the completed decontamination file. | required |
| Integration System Policy Management | Integration System Management | Register the external system to be integrated, issue an API Key, and set the default de-identification policy for that system. | required |
| | Setting Policy Expiration Date | Specify the expiration period for each policy item, automatically switching to the default decontamination policy after expiration. | Selection |
| Individual Policy Management | Member Management | Manage individual policy application targets by adding or removing users or groups as policy subjects. | required |
| | Individual Policy Management | Create individual policies to apply different policies for users or groups, and delete unnecessary policies. | required |
| | Setting Policy Expiration Date | Specify expiration dates for individual policy items so that the individual policies no longer apply after expiration. | Selection |
| Report | System Performance Statistics | Resource Utilization Summary | Set the query unit (10 minutes/1 hour/1 day) and period to summarize the average values of CPU, memory, and disk usage. | required |
| | Performance Overview Chart | Visualizing CPU, Memory, Disk, and Network as Time Interval Graphs | required |
| | Network Transmission Summary | Display the total network reception and transmission volume (MB) during the query period. | Selection |
| | Visualization Download | Charts and Data in SVG, PNG,CSVDownload in format | Selection |
| Influx and Processing Statistics | CDR Result Distribution | CDRDisplay the ratio of processing results (success/exception/block) in a pie chart and summary list. | required |
| | Traffic Statistics by Period | Visualizing the number of incoming files by date as a bar chart | required |
| | Traffic Statistics by Extension | Display the distribution of incoming traffic by file extension in a bar graph. | Selection |
| | Statistics by Integrated System | Provides the number of inflows, imports, and blocks by linked system, as well as reasons for blocking (encrypted files, unsupported extensions, tampering, etc.) in charts and tables. | Selection |
| Content Risk Statistics | Risk Distribution by Grade | Visualize the 6-level risk ratio from 'Safety' to 'Tampering' using a pie chart, and display the representative content types and counts for each grade. | required |
| | Threat Element Inflow Statistics | Display the detection counts by threat element in a bar graph and data table. | Selection |
| Log Management | Policy Change History | Change History Inquiry | View the policy change history as a list and check detailed information such as the previous/changed policy values and reasons for the changes for each record. | required |
| | Restoring History | Restore the changed policy to its previous state and enter the reason for restoration to record the restoration history. | Selection |
| Admin Audit Log | View Audit Logs | View audit logs of administrator actions (menu access, configuration changes, etc.) in chronological order, and filter by period, type, and keywords to check detailed information. | required |
| | Exporting CSV | View and Filtered Audit LogsCSVDownload in format | Selection |
| API Request Log | View API Request Logs | View the decontamination API request records of the integration system in chronological order, and filter by integration system, request results, etc. | Selection |
| Admin Settings | Account and Permission Management | Admin Account Management | Viewing, registering, modifying, deleting, and changing the password of the administrator account. Access rights are distinguished according to the administrator type (system/channel). | required |
| Web Console Access Control Management (IP) | IP-based Access Control | Set the access control mode (Allow All / Whitelist) for the admin web console and specify the allowedIPv4Manage Addresses | required |
| Data Organization Schedule Management | Setting Up a DB Data Cleanup Schedule | Set the activation status of the DB table cleanup schedule, execution frequency, and retention period for each table. | Selection |
| | View DB Data Cleanup Results | Check the consolidation execution date, data size before and after consolidation, and the number of records. | Selection |
| | Setting Up File Data Organization Schedule | Set the activation status of the file data organization schedule, execution frequency/day/time, and retention period by path. | Selection |
| | File Data Organization Results View | Check the cleanup execution date, storage capacity before and after cleanup, and the number of files. | Selection |
| Integrity Check Management | Integrity Check Settings | Set the activation status of integrity checks (service status checks) and the automatic check repetition interval. | Selection |
| | Manual Inspection Execution | Perform immediate integrity check | Selection |
| | Inspection History Inquiry | Display the inspection date, method, number of subjects, number of successes/errors in a list, and check detailed information such as service status and integrity status for each history. | Selection |
| Server Management | Server Information Retrieval | View the server list (ID, server name, representative IP:Port, etc.) and detailed information for each server such as IP, MAC address, registration/modification date, etc. | Selection |
| Service Management | Service Inquiry | Check the list of installed service modules and detailed information for each service, such as name, version, running status, port, memory usage, etc. | Selection |
| | Service Restart | Restart the selected service (stop and restart if it is currently running) | Selection |
| | Configuration File Management | View and manage service configuration files and register patch files | Selection |
| | Control History Inquiry | Check service control operation records (date, time, service name, administrator ID, reason for change, etc.) in list and detail view. | Selection |