Loading...
Spear Phishing Protection

Whitelist & Blacklist

User Guide

Get started

Easily share documents without having to rely on email, or old file servers.

REQUEST FREE TRIAL

ExchangeDefender Phishing Firewall is designed to be the last line of defense, to provide additional information about the link user clicked on, and to give them a chance to review the link that was in their email. Hackers rely on phishing to target busy and distracted office workers that will click on a link without questioning whether it’s legitimate or a scam. By the time the user clicks, it’s too late to protect them – browser is redirected and malware gets deployed (or worse).

This is a problem that ExchangeDefender Phishing Firewall eliminates by rewriting inbound email links and redirecting the browser through its security center:

ExchangeDefender Phishing Firewall enables organizations to manage their own safe and dangerous lists of web sites – phishing whitelist and blacklist.

ExchangeDefender Security Center

ExchangeDefender Phishing Firewall redirects email links through our Security Center where we have more resources to process the link, check it against flagged sites, expand shortened URLs, and display the full/obfuscated/decoded address so that users know exactly where they are about to go.

In order to facilitate specific business requirements, ExchangeDefender allows organizations to provide Whitelist and Blacklist entries on the service provider, domain, and user levels. For example, you may have to block a potentially dangerous web sites from everyone in your organization except specific individuals that have an explicit business requirement to visit them.

Spear Phishing is a problem that ExchangeDefender Phishing Firewall eliminates by rewriting inbound email links and redirecting the browser through it’s security center. We scan every single link in the HTML email and rewrite the hyperlink reference (so www.amazon.com in the message will still show up as www.amazon.com, but when the client clicks on the link they will be redirected to our Security Center.

ExchangeDefender Phishing Firewall will evaluate the link, who it was sent to, and who it was sent from and will apply proper organizational and user policies. If the link is safe, the user will automatically be redirected to the target web site transparently.

If the web site is not safe, or we do not have enough information about it, or it was flagged as dangerous by our proprietary lists, blocked by domain admin or service provider, users will be shown the link with the additional information.

ExchangeDefender Phishing Firewall enforces whitelists from the top down, giving the most priority to user specific whitelists. Domain and Service Provider whitelists are defined and implemented for the entire organization in order to best protect users without any training or interaction. However, when the user does have a need to access a remote site, it can be done transparently and safely without IT involvement.

ExchangeDefender Enterprise list is a manually curated list of safe and dangerous web sites and it contains data from third party security providers (list providers, antivirus vendors, our security peers, as well as our own honeypot and message models/AI). It is a comprehensive list that saves users time and eliminates ambiguity over whether something is a dangerous scam or a legitimate web site.

List Management

ExchangeDefender Phishing Firewall whitelists and blacklists are available at every level of ExchangeDefender. Simply add a site to either a whitelist or blacklist and ExchangeDefender will automatically propagate your rules down through the entire organization.

When a user clicks on a link inside an email,they will be redirected to our Security Center where they see the link as well as why it was blocked or presented to them for review. They can simply acknowledge the warning and continue to the web site, or they can login and save their choice. This way users can self-manage their safe list so that ExchangeDefender remembers their choice and automatically redirects them to the web site in the future.