Web Reputation Services

With one of the largest domain-reputation databases in the world, Trend Micro web reputation technology tracks the credibility of web domains by assigning a reputation score based on factors including website's age, historical location changes and indications of suspicious activities discovered through malware behavior analysis, such as phishing attacks that are designed to trick users into providing personal information. To increase accuracy and reduce false positives, Trend Micro Web Reputation Services assigns reputation scores to specific pages or links within sites instead of classifying or blocking entire sites, since often, only portions of legitimate sites are hacked and reputations can change dynamically over time.

Attackers may use phishing websites that disguise as legitimate websites to steal user credentials that provide access to your network. To enhance its capability of spotting these credential phishing websites, Cloud App Security integrates with dynamic URL scanning and applies it to URLs classified as untested by Trend Micro Web Reputation Services. By crawling the web pages of these URLs in real time, Cloud App Security determines whether the pages contain malicious patterns and takes pre-configured actions to keep users from zero-day phishing attacks.

Cloud App Security also leverages artificial intelligence (AI)-based computer vision to protect cloud service users against credential phishing attacks. It uses this advanced technology to recognize key elements of a valid cloud service logon page to help prevent users from submitting credentials to untrusted sites and help them get rid of account compromise.

In this release, for a URL detected as a credential phish, Cloud App Security takes the action configured by the administrator under Action on this URL.

Web Reputation Risk Levels

The following table explains the Web Reputation risk levels. View the table to understand why a URL is classified as dangerous, highly suspicious, or suspicious.

Risk Level

Description

Dangerous

The URL is verified to be fraudulent or known sources of threats.

Highly suspicious

The URL is suspected to be fraudulent or possible sources of threats.

Suspicious

The URL is associated with spam or possibly compromised.

Untested

The URL has not been tested by Trend Micro yet. While Trend Micro actively tests web pages for safety, users may encounter untested pages when visiting new or less popular websites. Blocking access to untested pages can improve safety but can also prevent access to safe pages.

Safe

The URL contains no malicious software and shows no signs of phishing.

Configuring Web Reputation

  1. Select Enable Web Reputation.
  2. Configure Rules settings.
    Option Description

    Apply to

    (Exchange Online and Gmail only) Select the scope of email messages that Web Reputation applies to.

    • All messages

    • Incoming messages

      Note:

      Incoming messages means that this policy applies only to incoming email messages sent from non-internal domains.

    Security Level

    Select Security Level and then the security level that Web Reputation applies to.

    Trend Micro considers a URL a web threat if its reputation score falls within a defined threshold, and safe if its score exceeds the threshold.

    Cloud App Security has three security levels that determine whether it will apply the configured action to a URL with a certain risk level. For details about the risk levels, see Web Reputation Risk Levels.

    • High: Blocks pages that are:

      • Dangerous

      • Highly suspicious

      • Suspicious

      • Untested

    • Medium: Blocks pages that are:

      • Dangerous

      • Highly suspicious

    • Low: Blocks pages that are:

      • Dangerous

    Message Attachments

    (Exchange Online and Gmail only) Select whether to scan message attachment content for suspicious URLs.

    Dynamic URL Scanning

    Select whether to further analyze, in real-time, the URLs classified as Untested by the Web Reputation Services, to detect phishing websites.

    For more information about dynamic URL scanning, see Web Reputation Services.

    Retro Scan & Auto Remediate

    (Exchange Online and Gmail only) This option is disabled by default.

    1. Select whether to rescan historical URLs in users' email metadata using newer patterns updated by the Web Reputation Services.

      Users' email metadata may include undetected suspicious or dangerous URLs that have only recently been discovered. Examination of such metadata is an important part of forensic investigations to determine if your email service is affected by attacks. Cloud App Security collects email metadata of users in your organization through the Threat Investigation API, and retroactively scans the historical URLs using newer web reputation patterns. Based on the latest scan result, Cloud App Security automatically takes remedial action on the affected email messages.

      Note:

      URLs in the Approved / Blocked URL Lists and in the email messages that fall into the Approved Sender List or Approved Header Field List will be excluded from scanning.

    2. On the screen that appears, click OK to allow Cloud App Security to create an authentication token, so it can use the Threat Investigation API to collect users' email metadata. You can view the authentication token on the Administration > Automation and Integration APIsscreen.

      This screen does not appear if there is already an authentication token with the Threat Investigation API type selected.

    After this option is enabled, Cloud App Security periodically examines historical URLs. Based on the retro scan results:

    • If the risk level of a URL changes and thus it hits the current policy, Cloud App Security takes the administrator-configured action on the affected email message.

    • If the risk level of a URL changes and thus it no longer hits the current policy, Cloud App Security restores the affected email message when Action was set to Quarantine. Cloud App Security does not undo the action that was set to other values than Quarantine.

  3. (Exchange Online and Gmail only) Configure Approved Sender List.
    1. Select Enable the approved sender list.
    2. Specify a sender email address to exclude from scanning and click Add >.
      Note:

      Be aware that for individual email addresses, wildcard characters and regular expressions are not supported.

    3. Optionally click Import to import sender email addresses in batches.
  4. Configure Approved/Blocked URL List.
    1. Select Enable the approved URL list.
    2. (Exchange Online only) Select Add internal domains to the approved URL list to exclude your internal domains from scanning.
    3. Specify a URL to exclude from scanning and click Add >.
      Note:

      Be aware that regular expressions are not supported.

      For URLs with query parameters, Cloud App Security uses exact match. Wildcard characters are not supported.

      For URLs without query parameters, wildcard characters only in the *.example.com and *.example.com/example/* formats are supported.

      For Gmail, only URLs without query parameters are supported.

    4. Optionally click Import to import URLs in batches.
    5. Select Enable the blocked URL list.
    6. Specify a URL to block without scanning and click Add >.
      Note:

      The approved URL list takes precedence over the blocked URL list. If a URL is added into both lists, it will be treated as an approved URL.

      Be aware that regular expressions are not supported.

      For URLs with query parameters, Cloud App Security uses exact match. Wildcard characters are not supported.

      For URLs without query parameters, wildcard characters only in the *.example.com and *.example.com/example/* formats are supported.

      For Gmail, only URLs without query parameters are supported.

    7. Optionally click Import to import URLs in batches.
    8. Go to Action to set an action for the blocked URL list.
      • For Gmail, Label email and Delete are supported.

      • For Salesforce, Pass, Quarantine, and Delete are supported.

      • For the other applications and services, Quarantine and Delete are supported.

  5. (Exchange Online only) Configure Approved Header Field List.
    1. Select Enable the approved header field list.
    2. Specify a header field name in the Name text box and a value for the field in the Value text box, and select Contains or Equals as necessary.
    3. Click Add.

      The specified entry appears in the area below.

      When the specified header field of an email message contains or exactly matches with the specified value depending on whether Contains or Equals is selected, the message will not be scanned by Web Reputation for malicious and suspicious URL detection, but will still go through the other security filters in the policy.

      Note:

      Be aware that Name and Value are case sensitive, and wildcard characters and regular expressions are not supported.

      The header field name and value cannot exceed 128 characters.

    4. Optionally repeat steps b and c to add another header field as necessary.

      The email message whose header field hits any of the specified entries will not be scanned by Web Reputation.

      Note:

      A maximum of 10 header fields is supported.

    5. To delete a specified header field, select it from the list and click Delete.

    The approved header field list configured here applies only to the current policy. You can also create an approved header field list that is applicable to all enabled policies for Exchange Online. For more information, see Configuring Approved Header Field List for Exchange Online.

  6. Configure Action settings.

    Cloud App Security protects services by executing specified actions on email messages or files that match scanning conditions. The action depends on the performed scan, the affected service, and the configured actions for that scan.

    • Exchange Online policies

    Option Description

    Tag subject

    Cloud App Security adds keywords before email message subject (Suspicious URL: <subject> ) to inform the user that an action occurred. The email message is delivered to the intended recipient, but the tag informs them that the original content was infected and was replaced.

    Delete

    Cloud App Security deletes the entire email message.

    Quarantine

    Cloud App Security moves the email message to a restricted access folder, removing it as a security risk to protected services.

    Pass

    Cloud App Security records the detection in a log and the message is unchanged.

    • SharePoint Online, OneDrive, Microsoft Teams (Teams), Box, Dropbox, and Google Drive policies

    Option Description

    Delete

    Cloud App Security deletes the file and replaces it with a replacement text file.

    Quarantine

    Cloud App Security moves the file to a restricted access folder, removing it as a security risk to protected services.

    Pass

    Cloud App Security records the detection in a log and the file is unchanged.

    Advanced Options

    Specify text to replace the original file content when a file is quarantined or deleted.

    • Teams Chat policies
    Option Description

    Pass

    Cloud App Security records the detection in a log and the message is unchanged.

    Block

    Cloud App Security calls Microsoft Teams to hide the message from both the sender and recipient.

    Note:

    If a file in a chat message violated the policy, it was hidden from the private chat window (the Chat tab), but it is still stored in the sender's OneDrive folder and shown on the Files tab.

    • Gmail policies

    Option Description

    Label email

    Cloud App Security includes a label Risky (by Trend Micro) at the top of the email message in the user's mailbox.

    Delete

    Cloud App Security deletes the entire email message.

    Pass

    Cloud App Security records the detection in a log and the message is unchanged.

    • Salesforce policies

    Option Description

    Pass

    Cloud App Security records the detection in a log and the content is unchanged.

    Quarantine

    • For text or a URL in Chatter, Community, and Cases, for example, Chatter post or Chatter link, Cloud App Security replaces half of the content violating the policy with asterisks (*) and moves the content to a restricted custom object. The quarantined content is not editable.

    • For files: Cloud App Security moves the file to a restricted custom object and replaces it with a pre-configured file, informing the user that the original file violated a specific Cloud App Security policy and was replaced.

      Note:

      For files with a version history, for example, Chatter File, Cloud App Security does not remove it, but adds a feed comment to warn the user that the file violated a specific Cloud App Security policy.

    Delete

    • For files: Cloud App Security deletes the file and adds a pre-configured replacement file, informing the user that the original file violated a specific Cloud App Security policy and was removed.

      Note:

      For files with a version history, for example, Chatter File, Cloud App Security deletes the file and adds a feed comment to warn the user that the file violated a specific Cloud App Security policy and was removed.

    • For text contents in Chatter and Community: Cloud App Security deletes the entire content.

    • For text contents in Cases: Cloud App Security records the detection in a log and replaces the entire content violating the policy with asterisks (*).

    1. Optionally select the Take action on URLs that have not been tested by Trend Micro Web Reputation Services check box to apply the configured action to the URLs not yet tested by Trend Micro, for example, new born URLs or shortened URLs.

    2. Optionally select the Configure actions dedicated to files check box to separately configure actions for files and whether to send notifications when the specified action is taken.

      If the Tag file name action is selected, specify the tag to amend to the file name.

      Note:

      The tag cannot exceed 20 characters or contain unsupported characters (/ \ : * ? &lt; &gt; " |).

    3. Specify text to replace the original file content when a file is quarantined or deleted.

  7. Configure Notification settings.
    Option Description

    Notify administrator

    Specify message details to notify administrators that Cloud App Security detected a security risk and took action on an email message, attachment, or file.

    Notification threshold sets limits on messages to send. Threshold settings include:

    • Send consolidated notifications periodically: Cloud App Security sends an email message that consolidates all the notifications for a period of time. Specify the period of time by typing a number in the box and selecting hour(s) or day(s).

    • Send consolidated notifications by occurrences: Cloud App Security sends an email message that consolidates notifications for a set number of filtering actions. Specify the number of virus/malware occurrences by typing a number in the box.

    • Send individual notifications: Cloud App Security sends an email message notification every time Cloud App Security performs a filtering action.

    Notify User

    Exchange Online and Gmail: Specify message details that notify recipients that Cloud App Security detected a security risk and took action on their email message or attachment.

    SharePoint Online, OneDrive, Microsoft Teams (Teams), Box, Dropbox, and Google Drive: Specify message details that notify the user who updated a file that Cloud App Security detected a security risk and took action on their file.

    Salesforce: Specify message details that notify the user who updated a Salesforce object record that Cloud App Security detected a security risk and took action on the update.

    Teams Chat: Cloud App Security does not provide this option. When a chat message was blocked, a notification "This message was blocked." provided by Microsoft appears in the sender's private chat window. Message senders can click What can I do? to view more information about the blocked messages.

    Note:

    When specifying a notification message, include relevant tokens and edit the message content as desired. For details about tokens, see Token List.

  8. Click Save or select another policy configuration on the left navigation to continue with additional rules.