With one of the largest domain-reputation databases in the
world, Trend Micro web reputation technology tracks the credibility
of web domains by assigning a reputation score based on factors including website's
age,
historical location changes and indications of suspicious activities discovered through
malware
behavior analysis, such as phishing attacks that are designed to trick users into
providing
personal information. To increase accuracy and reduce false positives, Trend Micro Web Reputation Services assigns reputation scores to
specific pages or links within sites instead of classifying or blocking entire sites,
since
often, only portions of legitimate sites are hacked and reputations can change dynamically
over
time.
Attackers may use phishing websites that disguise as legitimate websites to steal
user credentials that provide access to your network. To enhance its capability of
spotting these credential phishing websites, Cloud App Security integrates with dynamic URL scanning and applies it to URLs such as those classified
as Untested by Trend Micro Web Reputation Services. By crawling the web pages of these
URLs in real time, Cloud App Security determines whether the pages contain malicious patterns and takes pre-configured
actions to keep users from zero-day phishing attacks.
Cloud App Security also leverages artificial
intelligence (AI)-based computer vision to protect cloud service users against
credential phishing attacks. It uses this advanced technology to recognize key
elements of a valid cloud service logon page to help prevent users from submitting
credentials to untrusted sites and help them get rid of account compromise.
In this release, for a URL detected as a credential phish, Cloud App Security takes the action configured by the
administrator under Action on this URL.
Web Reputation risk levels
The following table explains the Web Reputation risk levels. View the table to
understand why a URL is classified as dangerous, highly suspicious, or suspicious.
Risk Level
|
Description
|
Dangerous
|
The URL is verified to be fraudulent or known sources of threats.
|
Highly suspicious
|
The URL is suspected to be fraudulent or possible sources of
threats.
|
Suspicious
|
The URL is associated with spam or possibly compromised.
|
Untested
|
The URL has not been tested by Trend Micro yet. While Trend Micro
actively tests web pages for safety, users may encounter untested pages when
visiting new or less popular websites. Blocking access to untested pages can
improve safety but can also prevent access to safe pages.
|
Safe
|
The URL contains no malicious software and shows no signs of
phishing.
|
Configuring Web Reputation
Procedure
- Select Web Reputation.
- Enable Web Reputation.
- Configure rule settings.SettingDescriptionApply to(Exchange Online and Gmail only) Select the scope of email messages that Web Scanning applies to.
-
All messages: means that this policy applies to incoming, outgoing, and internal email messages. Incoming/outgoing email messages are sent from/to non-internal domains.
-
Incoming messages: means that this policy applies only to incoming email messages sent from non-internal domains.
Note
For details about internal domains, see Configuring the internal domain listFor Exchange Online (Inline Mode), the scope is fixed to Inbound messages for inbound protection and Outbound messages for outbound protection. Inbound messages are sent from outside your organization to an address inside the organization, while outbound messages are sent from your organization to external addresses.Security LevelSelect Security Level and then the security level that Web Reputation applies to.Trend Micro considers a URL a web threat if its reputation score falls within a defined threshold, and safe if its score exceeds the threshold.Cloud App Security has three security levels that determine whether it will apply the configured action to a URL with a certain risk level. For details about the risk levels, see Web Reputation risk levels.-
High: Blocks pages that are:
-
Dangerous
-
Highly suspicious
-
Suspicious
-
Untested
-
-
Medium: Blocks pages that are:
-
Dangerous
-
Highly suspicious
-
-
Low: Blocks pages that are:
-
Dangerous
-
Message Attachments(Exchange Online and Gmail only) Select whether to scan message attachment content, including QR codes, for suspicious URLs.Note
For more information about QR code scanning, see Quishing detection.When you enable this option, Cloud App Security also scans the QR code images in the email body.Dynamic URL ScanningSelect whether to further perform real-time analysis on URLs, such as those classified as Untested by the Web Reputation Services, to detect phishing websites.For more information about dynamic URL scanning, see Web Reputation Services.Computer Vision(Exchange Online and Gmail only) Select whether to use computer vision techniques to detect phishing websites.Computer vision is an AI-based advanced detection technology that uses image analysis to detect phishing.Retro Scan & Auto Remediate(Exchange Online and Gmail only) This option is disabled by default.Note
This feature is not available for Exchange Online (Inline Mode).-
Select whether to rescan historical URLs in users' email metadata using newer patterns updated by the Web Reputation Services.Users' email metadata may include undetected suspicious or dangerous URLs that have only recently been discovered. Examination of such metadata is an important part of forensic investigations to determine if your email service is affected by attacks. Cloud App Security collects email metadata of users in your organization and retroactively scans the historical URLs using newer web reputation patterns. Based on the latest scan result, Cloud App Security automatically takes remedial action on the affected email messages.
Note
URLs in the Approved / Blocked URL Lists and in the email messages that fall into the Approved Sender List or Approved Header Field List will be excluded from scanning. -
On the screen that appears, click OK to allow Cloud App Security to collect users' email metadata.
After this option is enabled, Cloud App Security periodically examines historical URLs. Based on the retro scan results:-
If the risk level of a URL changes and thus it hits the current policy, Cloud App Security takes the administrator-configured action on the affected email message.
-
If the risk level of a URL changes and thus it no longer hits the current policy, Cloud App Security restores the affected email message when Action was set to Quarantine. Cloud App Security does not undo the action that was set to other values than Quarantine.
Time-of-Click Protection -
Select Enable Time-of-Click Protection.
Note
-
Time-of-Click Protection applies to real-time scans for URLs in incoming email messages. To configure actions for those URLs, go to.
-
This feature is not available for the outbound protection of Exchange Online (Inline Mode).
-
-
Select the range of URLs to which Time-of-Click Protection applies.
-
- Click Approved/Blocked List.
- (Exchange Online and Gmail only) Configure the approved sender list.
- Select Enable the approved sender list.
- Specify a sending email address or domain to bypass Web Reputation
scanning and click Add >.
Note
You can use the wildcard character (*) to represent any characters in the email address or domain name. Examples: *@example.com, name@*.com, *@*.example.comThe following formats are invalid: *@*, * - Optionally click Import to import sender email addresses in batches.
- Configure the approved/blocked URL lists for Web Reputation.
- Enable the approved URL list.
- (Exchange Online only) Select Add internal domains to the approved URL list to exclude your internal domains from scanning.
- Specify a URL to exclude from Web Reputation scanning and click
Add.
Note
Be aware that regular expressions are not supported.For URLs with query parameters, Cloud App Security uses exact match. Wildcard characters are not supported.For URLs without query parameters, wildcard characters only in the *.example.com and *.example.com/example/* formats are supported.For Gmail, only URLs without query parameters are supported. - Optionally click Import to import URLs in batches.
- Enable the blocked URL list.
- Specify a URL to block without scanning and click
Add.
Note
The approved URL list takes precedence over the blocked URL list. If a URL is added into both lists, it will be treated as an approved URL.Be aware that regular expressions are not supported.For URLs with query parameters, Cloud App Security uses exact match. Wildcard characters are not supported.For URLs without query parameters, wildcard characters only in the *.example.com and *.example.com/example/* formats are supported.For Gmail, only URLs without query parameters are supported. - Optionally click Export to export URLs in batches.
- Go to Action to set an action for the blocked
URL list.
-
For Gmail, Label email, Delete, and Quarantine are supported.
-
For Salesforce, Pass, Quarantine, and Delete are supported.
-
For the other applications and services, Quarantine and Delete are supported.
-
- (Exchange Online only) Configure the approved header field list.
- Enable the approved header field list.
- Specify a header field name in the Name text box and a value for the field in the Value text box, and select Contains or Equals as necessary.
- Click Add.The specified entry appears in the area below.When the specified header field of an email message contains or exactly matches with the specified value depending on whether Contains or Equals is selected, the message will not be scanned by Web Reputation for malicious and suspicious URL detection, but will still go through the other security filters in the policy.
Note
Be aware that Name and Value are case sensitive, and wildcard characters and regular expressions are not supported.The header field name and value cannot exceed 128 characters. - Optionally repeat steps b and
c to add another header field as
necessary.The email message whose header field hits any of the specified entries will not be scanned by Web Reputation.
Note
A maximum of 10 header fields is supported. - To delete a specified header field, select it from the list and click Delete.
The approved header field list configured here applies only to the current policy. You can also create an approved header field list that is applicable to all enabled policies for Exchange Online. For more information, see Configuring approved header field list for Exchange Online. - (Exchange Online only) Configure the approved URL list for Time-of-Click
Protection.
- Enable the approved URL list for specified URLs to bypass Time-of-Click Protection, which rewrites suspicious URLs in incoming email messages to redirect the URLs to the Web Reputation Services.
- Specify a URL to exclude from Time-of-Click Protection scanning and
click Add.
Note
Be aware that regular expressions are not supported.For URLs with query parameters, Cloud App Security uses exact match. Wildcard characters are not supported.For URLs without query parameters, wildcard characters only in the *.example.com and *.example.com/example/* formats are supported. - Optionally click Import to import URLs in batches.
- Optionally click Export to export URLs in batches.
- Click Action & Notifications.
- Configure Action settings.Cloud App Security protects services by executing specified actions on email messages or files that match scanning conditions.For details about the actions, see Actions available for different services.
-
Optionally select the Take action on URLs that have not been tested by Trend Micro Web Reputation Services check box to apply the configured action to the URLs not yet tested by Trend Micro, for example, new born URLs or shortened URLs.
-
Optionally select the Configure actions dedicated to files check box to separately configure actions for files and whether to send notifications when the specified action is taken.
Note
When this option is selected, for a file, Cloud App Security takes the action specified here instead of the policy-level action described in the above tables in step 7. -
(Salesforce only) Select Apply secondary action when file quarantine fails and specify a secondary action if you want to take a backup action when the quarantine action for a file fails.
Note
This option can be configured only when the Quarantine action is selected.- If Configure actions dedicated to files is enabled with the Quarantine action selected, the secondary action applies when this Quarantine action fails.
- If Configure actions dedicated to files is not enabled, the secondary action applies when the policy-level Quarantine action (as described in the above tables in step 7) for a file fails.
-
If the Tag file name action is selected, specify the tag to append to the file name.
Note
The tag cannot exceed 20 characters or contain unsupported characters (/ \ : * ? < > " |).The tag applies to the Tag file name action specified in the Action section. -
Specify text to replace the original file content when a file is quarantined or deleted.The text applies to the Quarantine and Delete actions in the Action section.
-
- Configure Notification
settings.
Option Description Notify administrator-
Specify the administrators to notify by selecting a recipient group or specifying individual recipients. You can click Manage recipient groups to edit the members in a group or add more groups.
-
Specify message details to notify administrators that Cloud App Security detected a security risk and took action on an email message, attachment, or file.
-
Set the notification threshold which limits the number of notification messages to send. Threshold settings include:
-
Send consolidated notifications periodically: Cloud App Security sends an email message that consolidates all the notifications for a period of time. Specify the period of time by typing a number in the box and selecting hour(s) or day(s).
-
Send consolidated notifications by occurrences: Cloud App Security sends an email message that consolidates notifications for a set number of filtering actions. Specify the number of virus/malware occurrences by typing a number in the box.
-
Send individual notifications: Cloud App Security sends an email message notification every time Cloud App Security performs a filtering action.
-
Notify UserExchange Online and Gmail: Specify message details that notify recipients that Cloud App Security detected a security risk and took action on their email message or attachment.SharePoint Online, OneDrive, Microsoft Teams (Teams), Box, Dropbox, and Google Drive: Specify message details that notify the user who updated a file that Cloud App Security detected a security risk and took action on their file.Salesforce: Specify message details that notify the user who updated a Salesforce object record that Cloud App Security detected a security risk and took action on the update.Teams Chat: Cloud App Security does not provide this option. When a chat message was blocked, a notification "This message was blocked." provided by Microsoft appears in the sender's private chat window. Message senders can click What can I do? to view more information about the blocked messages.Note
When specifying a notification message, include relevant tokens and edit the message content as desired. For details about tokens, see Token list. -
- Click Save or select another policy configuration on the left navigation to continue with additional rules.