Forums

Articles
Create
cancel
Showing results for 
Search instead for 
Did you mean: 

Strengthen protection for your Atlassian files with malware scanning

Hi Atlassian community!

I'm David B. Cross, your Chief Information Security Officer and I am thrilled to announce a new addition to our security today. In direct response to your valuable feedback, my team has successfully deployed our new malware scanning solution. This means all new file uploads across Jira, Confluence, and Trello will now automatically undergo malware scanning.

How does malware scanning work?

Every new file attachment uploaded to Jira, Confluence, and Trello is automatically scanned for malware using a combination of in-house and third-party detection tools. If a file is flagged as malicious, users will see a clear warning before downloading or accessing it. Admins can also review malware findings in the audit log, providing an additional layer of security oversight.

 

81c4a9bd-8f2e-4b01-ad91-b7c5a722bb83.png

What’s next?

We are committed to continuously improving scanning accuracy and plan to introduce more self-service resources to help you manage malware findings. Additionally, we're exploring the expansion of malware scanning to other cloud products.

Call to action

We’re always looking to hear from you, so please share any questions or comments below.

Thank you for your partnership and feedback!

21 comments

Robert Paul Newman
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
July 1, 2025

Is this feature supported in both cloud and datacenter platforms?

Like # people like this
Brita Moorus
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
July 1, 2025

Is this feature supported in all (Free, Standard, Premium, Enterprise) plans?

Like # people like this
Tevi Lawson
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
July 1, 2025

@David Cross Sounds like a great feature to enhance security. Can we get more insight on how this feature works under the surface and whether it can be optional? Are there data/logs being sent back to Atlassian in-house or third-party environments for analysis?

Like # people like this
Shawn Stevens
Contributor
July 1, 2025

Is there an option to automatically remove attachments that have been flagged by your logic? 

Like # people like this
Jared Schmitt
Contributor
July 1, 2025

Hi @David Cross , does 

announce a new addition to our security today

mean this feature is also released "today"? Or is it just the announcement and it will be distributed via the usual release tracks? I'm a bit at war with Atlassian release management lately...

And as @Tevi Lawson asked:

  1. What data is shared with external parties?
  2. Who are these external parties?
  3. Do admins have control over this feature?

Thanks for the clarification!

Like # people like this
Yatish Madhav
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
July 1, 2025

Thanks @David Cross this is really great! Happy to see posts about progressive security updates too.

I am with @Tevi Lawson @Jared Schmitt and @Shawn Stevens comments above

Please advise? Thank you

Yatish

Like # people like this
Daria Kulikova_GitProtect_io
Community Champion
July 1, 2025

Thank you, @David Cross , it's a great update! 

Which file types are scanned? Are there any limitations or exclusions when it comes to file formats?

Thanks,

Like # people like this
Tushar Gohel
Contributor
July 1, 2025

Hello @David Cross 

We have been waiting for this feature for a long time. We are really excited to try it out. I have a few questions about the functionality.

  1. Can we restrict uploading the malicious files it self?
  2. Can we integrate our own 3rd party scanning tool?
  3. Can we define our own criteria for which files we want to allow?

Thanks,

Tushar

Like Susan Waldrip likes this
Kim Howitt
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
July 1, 2025

Hi Atlassian Community,

I'm Kim H, Product Manager within David B's team and wanted to spend some time answering some of your questions!

Please see the responses below:

 

Is this feature supported in both cloud and datacenter platforms?
  • @Robert Paul Newman  - This feature is supported for cloud based products for Jira, Confluence, Trello and covers Marketplace Data Centre platforms

 

Is this feature supported in all (Free, Standard, Premium, Enterprise) plans?
  • @Brita Moorus - Yes, malware scanning is supported for all free, standard, premium and enterprise plans, however in order to gain access to malware findings in Audit Log as an administrator, you will need a Guard Standard, Premium or Enterprise subscription

 

@David Cross Sounds like a great feature to enhance security. Can we get more insight on how this feature works under the surface and whether it can be optional? Are there data/logs being sent back to Atlassian in-house or third-party environments for analysis?
  • @Tevi Lawson - We scan files on upload and provide users with a warning on download if any malware is detected. There are data/logs that get sent to Audit Log for administrators to review the findings that will require a Guard Standard, Premium or Enterprise subscription to view them
  • As for third-party environment for analysis, yes we use a combination of third-party and in-house tools for this purpose

 

Is there an option to automatically remove attachments that have been flagged by your logic?
  • @Shawn Thank you for your feedback here. At this stage we haven't got automatic removals for attachments in place. We are however looking into this and will identify opportunities on our roadmap to make optimisations to improve the logic to ensure attachments flagged can be removed in future.

If you have any further questions, feel free to drop them in the comments below

Cheers,

Kim

Like # people like this
Kim Howitt
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
July 2, 2025

Thank you all for keeping the questions coming!

Second set of answers to the following questions:

Which file types are scanned? Are there any limitations or exclusions when it comes to file formats?

 

We have been waiting for this feature for a long time. We are really excited to try it out. I have a few questions about the functionality.


1. Can we restrict uploading the malicious files it self?

2. Can we integrate our own 3rd party scanning tool?

3. Can we define our own criteria for which files we want to allow?

  • @Tushar Gohel - Thank you for the feedback. At this stage, you cannot, we will however look into this and review opportunities to put in onto our roadmap as an optimisation, we hear you on this one and will take note of this as a feature request as it has been mentioned a few times on the comments section.
Like # people like this
Tere Pile
Contributor
July 2, 2025

@Kim Howitt I'm reading this correctly, file is scanned on upload, but warning only appears on the download?

Only option to review 'upload' is w/Guard (presuming in the audit log) any information on exactly what we would see specifically.   Also am I correct to presume, it will only scan files on claimed domain users who are billable? 

Like # people like this
Jonathan Smith
Contributor
July 2, 2025

If there are any malware scanning features available in Guard Premium but not in Guard Standard, please list all the differences in a table. Thank you.

Like # people like this
Dan Gerrey
I'm New Here
I'm New Here
Those new to the Atlassian Community have posted less than three times. Give them a warm welcome!
July 2, 2025

Has this been rolled out to all sites already or will it be a staggered rollout? If the latter, is there an easy way of seeing if it's on your site?

Like Susan Waldrip likes this
Kelvin Russell July 2, 2025

This is Great news @Kim Howitt  Am I correct in assuming this isn't available for JSM, specifically the portal?

Like # people like this
Kim Howitt
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
July 2, 2025

Hi All,

Thank you for your continued interest in our launch. I'll be answering the third set of questions below!

 

@Kim Howitt I'm reading this correctly, file is scanned on upload, but warning only appears on the download?
Only option to review 'upload' is w/Guard (presuming in the audit log) any information on exactly what we would see specifically.  Also am I correct to presume, it will only scan files on claimed domain users who are billable?
  • @Tere Pile At this stage that is correct, we will still continue to scan the files on upload and will look to make optimisations in future to block malicious uploads. The scanning of files is available to all tiers (free, premium and enterprise) of our customers, not just those who are billable. The Audit log administrator experience to review the specific malware finding will however, will require Atlassian Guard Standard, Premium or Enterprise, which is billable. 
  • If i've understood your question correctly too, Audit log will display the following:
    • Timestamp
    • Location
    • Actor
    • Activity

 

If there are any malware scanning features available in Guard Premium but not in Guard Standard, please list all the differences in a table. Thank you.
  • @Jonathan Smith The features at this stage available in Guard premium and Standard are the same, they both have:
    • Scanning of files on upload and warning messages on download to warn users
    • Malware findings are surfaced in Audit log for administrators
  • We are actively looking into extending the feature sets for both subscription types in future which will start to differentiate the offerings. More to come!

 

Has this been rolled out to all sites already or will it be a staggered rollout? If the latter, is there an easy way of seeing if it's on your site?
  • @Dan Gerrey This has already been rolled out to all sites for Jira, Confluence and Trello
  • The only way to see the experience at this stage will be on download of a malicious file attachment

 

This is Great news @Kim Howitt Am I correct in assuming this isn't available for JSM, specifically the portal?
  • @Kelvin Russell The good news is that Atlassian already scans for malware in JSM 
Like # people like this
Jared Schmitt
Contributor
July 2, 2025

Hi @Kim Howitt 

In your forth round of answers, could you please let us know:

  1. What data is shared with external parties?
  2. Who are these external parties?
  3. Do admins have control over the feature (turn off/on)?
  4. How to retrieve an attachment marked as malware?

Imagine someone uploads an important document, let's say an invoice, and the system (mistakenly) thinks it's malware. How can I as admin still retrieve the document?

Like # people like this
Oliver Siebenmarck _Polymetis Apps_
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
July 3, 2025

Hi @Kim Howitt , Hi @David Cross ,

Thank you for this, that's an amazing feature to add!

Like @Jared Schmitt I am wondering about the third parties you mentioned. We, and I believe others, too, are pretty particular about GDPR and InfoSec in general, so my first stop was Atlassian's list of sub-processors: https://www.atlassian.com/legal/sub-processors#third-party-sub-processors

I couldn't find any entries that seem to fit with malware scanning, so now we have to weigh the risk of potentially having our attachments scanned by unknown third parties or having to disable attachment uploads altogether. Neither of which sounds good, tbh.

Can you shed any light on how this works, which third parties are involved, and what kind of data they actually get access to? 

Thank you,
 Oliver from Polymetis Apps

 

 

 

Like # people like this
Gus_Vega
Contributor
July 8, 2025

Hi @Kim Howitt 

Had a few questions as well:

  • Is there a way to setup a notification when an attachment is flagged as malware both in Jira and/or Confluence? Can we use Atlassian Guard as trigger for this purpose?
  • Also, will the audit log show whether the attachment flagged as malware show if it was identified by Atlassian internal tools or the third party?
  • Will files upload into Jira/Confluence prior to July 1, 2025, be scanned for malware? Or only new files uploaded after July 1 be scanned?
Like # people like this
Kim Howitt
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
July 9, 2025

Hi All,

Thank you for your questions! I'm back to answer the fourth round below:

In your forth round of answers, could you please let us know:

  1. What data is shared with external parties?

  2. Who are these external parties?

  3. Do admins have control over the feature (turn off/on)?

  4. How to retrieve an attachment marked as malware?

Imagine someone uploads an important document, let's say an invoice, and the system (mistakenly) thinks it's malware. How can I as admin still retrieve the document?

  • @Jared Schmitt 
  • No customer data ever leaves Atlassian's systems, we only receive our vendor's malware hashes inbound only
  • At this stage, admins do not, we will however look into this and review opportunities to put in onto our roadmap as an optimisation, we hear you on this one and will take note of this as a feature request as it has been mentioned a few times on the comments section.
  • To retrieve an attachment marked as malware, as an administrator you can navigate to our Audit log to view the location, file name and actor/uploader. In order to access the Audit log, you will need a Atlassian Guard Standard, Premium or Enterprise subscription. For your safety, we recommend you tread carefully and do not download the file.

 

I am wondering about the third parties you mentioned. We, and I believe others, too, are pretty particular about GDPR and InfoSec in general, so my first stop was Atlassian's list of sub-processors: https://www.atlassian.com/legal/sub-processors#third-party-sub-processors
I couldn't find any entries that seem to fit with malware scanning, so now we have to weigh the risk of potentially having our attachments scanned by unknown third parties or having to disable attachment uploads altogether. Neither of which sounds good, tbh.
Can you shed any light on how this works, which third parties are involved, and what kind of data they actually get access to?

  • @Oliver Siebenmarck _Polymetis Apps_ - No customer data ever leaves Atlassian's systems, we only receive our vendor's malware hashes inbound only
  • Our scans are GDPR compliant as files hosted in GDPR regions are all scanned in the source region

 

Is there a way to setup a notification when an attachment is flagged as malware both in Jira and/or Confluence? Can we use Atlassian Guard as trigger for this purpose?
Also, will the audit log show whether the attachment flagged as malware show if it was identified by Atlassian internal tools or the third party?
  • @Gus_Vega - Yes, if you have an Enterprise plan for Jira or Confluence, or Atlassian Guard Premium, you will be able to set up Audit log activities to another tool using a webhook that connects to our Audit log. For more details, please visit this page for more information.
  • The Audit log will not show if it was identified via internal tools or third parties
Like # people like this
Jared Schmitt
Contributor
July 9, 2025

Hi @Kim Howitt 

I appreciate the time you take to answer our comments. However not all questions have been addressed in a way that let's an Org admin rest well at night.

I understand admins cannot control this behavior. Really not cool, but that seems to be a common practice at Atlassian.

What is still unclear to me:

  • Who are the external parties? They need to be explicitly named as this might influence the decision of our Security+Legal department in contract reviews. These names need to appear in officials docs somewhere. 
  • Do I understand correctly that admins can still download an attachments flagged as malware from the audit log? So we can access a file even if it is compromised? 
Like # people like this
Gus_Vega
Contributor
July 15, 2025

Hi @Kim Howitt 2 additional questions that came up:

  •  What is defined as the GDPR scanned source region? Is that specific to the geo-location of the person who uploaded / or is attempting to download the attachment? 

 

  • If we do not have a pinned data residency for all apps, does that play any factor in the source region as well? 
Like Tina Borden likes this

Comment

Log in or Sign up to comment
TAGS
AUG Leaders

Atlassian Community Events