This guide describes the Brand Exploit Protect dashboard, including:
- Accessing the Dashboard
- Adding URLs
- Filtering / Sorting the Dashboard
- Accessing a URL's Details
- Taking Action on a URL
- Exporting the Dashboard List
Brand Exploit Protect uses a dashboard to display all URLs related to your chosen domains that have been detected by us. The dashboard's data is continually updated as new information comes to light. By monitoring activity on the dashboard, you can take direct action to safeguard against counterfeit domains and websites that pose a threat to your company.
Your main domain content (HTML) is used to detect live attacks and impersonation attempts. If found, URLs are marked with a "Live Attack" status. The dashboard's statistics help to provide a high-level overview of:
- The types of harmful URL threats your company is facing.
- The trends in the threats you receive.
Accessing the Dashboard
To access the dashboard:
- Log in to Brand Exploit Protect.
- Click on Dashboard in the navigation pane.
The dashboard homepage is split into the following sections:
- Detected URLs: This lists the URLs that are flagged as potentially harmful. Whilst the list displays URLs that have been detected, you can manually add up to 100 URLs that you deem malicious or harmful to your company. See the "Adding URL" section below for further details. A URL can have one of the following statuses:
| Status | Description |
|---|---|
| Not Suspicious | When we start the onboarding process, we receive a whitelist of all the domains that your company owns. These domains are set to "Not Suspicious". Websites that are accessed and found to be legitimate and unrelated to your brand, are also marked as "Not Suspicious". URLs with the "Not Suspicious" tag aren't monitored to reduce the amount of noise, and provide you with the most relevant information. |
| Suspicious | Our algorithm searches for similarities between your domain and other existing domains. The domains that were found similar are inserted into our dashboard, and automatically tagged as "Suspicious". We consider every URL we find as suspicious until proven otherwise. However, not all domains under the category of "Suspicious" are malicious. It just means that they're continuously monitored. |
| Live Attack | A suspicious website becomes a "Live Attack" when the similarity between the site content of a website and your website bypasses a specific threshold. This usually happens when your logo and content are on the lookalike domain, or if it is similar to a previous attack you've experienced. |
- Historical Evaluation: This displays a chart of recent URL status activity. It allows you to monitor the status and trends in the types of URL threats your company receives. The color-coded graph reports the number of URLs and how they have been marked, according to status.
- Detected URLs (Past Month): This displays a graphical summary of detected URLs in the past month by date and number.
- TLD Distribution: This donut chart displays the number of top-level domains according to category.
Adding URLs
To add additional URLs:
- Click on the + Add button.
- Enter the Full URL (e.g. http://www.example.com).
- Press the Enter key.
- Repeat Steps 2 and 3 for other domains.
- Click on the Add URLs button.
Filtering / Sorting the Dashboard
You can filter and sort the dashboard using icons above each column. These help you to focus on specific URLs listed on the dashboard.
Consider the following when filtering/sorting:
- When a filter is applied, the column's filter icon turns orange.
- You can filter more than one column.
- An indication is displayed at the top of the dashboard of the filters applied.
Accessing a URL's Details
With the list of URLs displayed on the dashboard, you can display further details of a specific URL by either clicking on the URL or the ... icon at the end of the row. The URL's details are displayed in the following sections:
-
Content Info: Displays generic information about the URL, including the scan date, status, title, redirect URL, and username. Additionally, you can click on the:
- Rescan button to refresh the URL's details. This is only available if the URL status is "Suspicious".
- < or > arrows either side of the Scan Date field to display the results of other scans
- </> HTML Code button to display any HTML added to the URL.
- DNS: Displays DNS information including the PNS, NS, A, MX, and CNAME records.
Hover over any of these fields to display a icon which when clicked copies the entries to your clipboard.
- Mimecast Email & Web Security: This section allows you to generate security policies in your Mimecast account.
This section is only populated if your Mimecast account has email and web security services licensed on it.
Enable one or more of the following:
- Block Sender Domain: Creates a Blocked Sender policy to stop all emails from the domain from reaching your Mimecast account. Click on the Block button in the confirmation dialog to confirm the policy's creation.
- Block URL (Domain): Creates a Targeted Threat Protection Managed URL with the "Override Type " set to "Blocked" and the "Match Type" set to "Domain". This blocks both the chosen URL, and any others that exist that use the domain.
- Block URL (Explicit): Creates a Targeted Threat Protection Managed URL with the "Override Type " set to "Blocked" and the "Match Type" set to "Explicit". This blocks the chosen URL, but not any others that exist that use the domain.
Taking Action on a URL
From either the dashboard or the URL Details, you can take action against a URL. The actions available is dependent on the URL's current status.
To take action on a URL:
- Click on the Action button.
- Select the required Action:
| Action | Description | Available in Status |
|---|---|---|
| Mark as Suspicious | The URL is marked as suspicious, but no attempt is made to take it down. | Not Suspicious |
| Mark as Not Suspicious | All new URLs are automatically marked as suspicious and are continually monitored for changes (e.g. content, DNS, or MX record changes). You can mark a URL as not suspicious at any time (e.g. if the domain belongs to you or a partner). | Suspicious |
| Request Take Down |
A request is made to take down the URL is sent to the host. Takedowns are only available if the URL has content similar to yours, or has sent malicious messages to your customers. A misleading domain name without proof of phishing is usually insufficient evidence to successfully take a site down. |
Suspicious Take Down Aborted Taken Down Fake Data Submitted |
Exporting the Dashboard List
You can export the dashboard list to a .CSV file:
- Click on the Export button.
- Select either:
-
- Entire List: This exports all the dashboard data regardless of what filters are applied.
- With Filters: This exports only the dashboard data according to what filters are set.
- Click on the Export button. A notification is displayed when the file has been downloaded successfully. The file name is "export-replications-from-segasec@xxxxxxxxxxxxx".
Comments
Please sign in to leave a comment.