Processing History

The "Processing History" page allows users with specific roles to view files that have been uploaded to MetaDefender Managed File Transfer™.

Hide / Show Columns

To toggle the visibility of a column, click the cogwheel icon located in the last column and select which columns you want to show or hide. The desired layout can be stored by clicking on the "Save View" button.

The "Last Time Downloaded" column displays the most recent download timestamp for files shared with users. Downloads by Administrators and Auditors do not affect the "Last Time Downloaded" record.

Sorting

On the "Processing History" page, you can sort the data by clicking on the respective column headers. The following fields are currently supported for sorting:

  • File Name
  • Expiration Date
  • Upload Date
  • File Size

Filtering

To access available filters, click the "Advanced" button. When a filter is active, you can remove it by clicking the "X" button.

Supported filters:

  • State: Filter files based on whether they were Allowed or Blocked.
  • Result: Filter files according to the MetaDefender Core's scanning result.
  • Date and Time: Narrow down the processing history list using predefined time intervals or create a custom timeframe based on when the file was uploaded.
An active filter for Result

An active filter for Result

Exporting History

You can export processing history in CSV format. This export feature allows you to filter records by upload time, offering the option to choose between predefined intervals or custom timeframes. All available columns are included in the export, with localization applied where applicable.

Applied filters or selected columns at the "Processing History" page do not effect the Processing History Export.

Processing History Export modal

Processing History Export modal

To prevent formula injections (also known as CSV injections), the exported CSV may include additional apostrophe characters at the beginning of fields. This prevents spreadsheet applications from interpreting potentially malicious fields as formulas.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard