Threat Feed Settings
Setting | Description |
---|---|
Enable Threat Feed | Enables or disables the Threat Feed entirely. This setting is enabled by default. |
Resubmit threats which are seen again after |
Determines when URIs that are seen repeatedly in authentication failure samples will be resubmitted to your Threat Feed. Select from:
If your Threat Feed contains a significant number of false positive (in most cases, legitimate) or junk/spam URLs, the latter not being actual threats and typically not requiring action, you may want to choose one of the longer durations. The default 2 week period is good for most organizations so you can see if there are URLs for which you missed taking necessary action, especially if you use a takedown vendor that charges by the link and limits the time by contract for you to take action. |
Signal strength |
Determines what threats are included in the Threat Feed. Select from:
|
Include detected by: threat source in feed emails | Determines if the Detected By column will appear in the Threat Feed table. The Detected By column separates threat feed submissions into their threat source, which can be from DMARC data or Brand Spoofs. |
Exclude URIs on the DMARC Protection allow list | DMARC Protection maintains a global allow list of known legitimate URI patterns. This setting determines if the URIs added to allow list will appear in your Threat Feed. Select it (the default value) to ensure that URIs matching these patterns are not submitted on your Threat Feed. |
Exclude URIs on my allow list | You can add a URI to an allow list for your organization. This setting determines if these URIs added to the allow list will appear on your Threat Feed. Select it (the default value) to ensure that URIs matching these patterns are not submitted on your Threat Feed. |
Exclude URIs from sources with an IP Reputation threshold greater than |
IP Reputation is a reputation score for the source IP address of an email message. IP Reputation values range from -10 (worst) to +10 (best). You can exclude URIs extracted from messages whose source has an IP Reputation above a designated threshold. The default value is 0. You might choose, for example, to have your Threat Feed ignore any URIs coming from messages where the source has a highly positive IP Reputation. |
Send Threat Feed to email recipients |
Determines if items in your Thread Feed will be sent to the recipients you designate. Enter a comma-separated list of valid email addresses. This list should include the email address of any take down vendors that you wish to directly receive your Threat Feed. NOTE:
This email feed is potentially high volume. It is recommended for automated processing and not a personal email address. These email messages will contain malicious URIs. You should add these messages from your anti-spam and anti-virus filters to allow list. Threat Feed email messages:
|
Include header From: domains in feed emails |
Determines if the From: header domain used in the message the URI was extracted from will be included in the Threat Feed email. The default is not selected. This can provide additional information about which domain the abuse was from. In general, you will want to enable this option unless it breaks automated processes with tolls or third-party services you use. |
Include Subject: lines in feed emails |
Determines if the Subject line used in the message that the URI was extracted from will be included in the Threat Feed email. The default is not selected. This can provide additional information about abuse messages, such as subject commonalities. For example, subjects that all contain viagra" or "accounts." In general, you will want to enable this option unless it breaks automated processes with tolls or third-party services you use. |
Subject of feed emails |
Determines the Subject line of Threat Feed emails. This can help you to filter these messages and direct them to specific folders. The default is "Fortra threat feed for Fortra Data, Inc.." |
Allow header From: domains |
Determines if URIs contained in messages that use specific domains in the From header are omitted from your threat feed. Enter valid domain names in a comma separated list to exclude URIs in messages from these domains. For example, the domain email.mycorp.com is used by your corporate employees to send email. The authentication failures from this domain tend contain a lot of valid URLs and you don't want to include any URLs in messages from email.mycorp.com in your organization's Threat Feed. You should select this option and enter email.mycorp.com in the text field. |
Send threat feed to Internet Identity (target to provide IID: 'Fortra Data, Inc.') | If your takedown vendor is Internet Identity (IID, now Infoblox), you can select this option to submit your Threat Feed directly to IID without sending Threat Feed emails. The default is not selected. |